A Few Hotfixes Before -rc2

As we approach the release of -rc2, we want to ensure that our users are protected from malicious actors seeking to scrape our websites for their own gain. To achieve this, our administrator has set up Anubis, a powerful tool designed to safeguard our server against AI-powered bot attacks.

What is Anubis?

Anubis utilizes a Proof-of-Work scheme, similar to Hashcash, which was originally proposed as a solution to reduce email spam. The idea behind this system is that at an individual scale, the additional load caused by Anubis is negligible. However, when faced with mass scraper attacks, it becomes prohibitively expensive for malicious actors to continue their efforts. In essence, Anubis acts as a digital "speed bump" that makes it costly for bots to access our website.

The Purpose of Anubis

While Anubis may seem like an effective deterrent against AI-powered bot attacks, its true purpose is more nuanced. By implementing this system, we are able to create a "good enough" placeholder solution that allows us to focus on more advanced methods of identifying and fingerprinting headless browsers – those elusive entities that often masquerade as legitimate users.

Requirements for Using Anubis

For our website to function with Anubis, you will need to enable JavaScript on your device. This is because the challenge-proof of work page presented by Anubis relies heavily on modern JavaScript features. Unfortunately, plugins like JShelter may interfere with this functionality, so we kindly ask that you disable such plugins for this domain.

Anubis Version 1.20.0

Our website is currently running Anubis version 1.20.0. We understand that this may present some challenges for users who rely on no-JS solutions, but we are working diligently to develop a solution that will meet these needs in the near future.

A Note from Our Administrator

"As AI companies continue to redefine the social contract around website hosting, we must adapt and evolve our security measures. Anubis is an important step forward in this journey, but it is not a perfect solution – and we acknowledge that there are still workarounds for malicious actors seeking to bypass its limitations.