this post was submitted on 26 Nov 2025
337 points (98.8% liked)

Showerthoughts

38296 readers
1210 users here now

A "Showerthought" is a simple term used to describe the thoughts that pop into your head while you're doing everyday things like taking a shower, driving, or just daydreaming. The most popular seem to be lighthearted clever little truths, hidden in daily life.

Here are some examples to inspire your own showerthoughts:

Rules

  1. All posts must be showerthoughts
  2. The entire showerthought must be in the title
  3. No politics
    • If your topic is in a grey area, please phrase it to emphasize the fascinating aspects, not the dramatic aspects. You can do this by avoiding overly politicized terms such as "capitalism" and "communism". If you must make comparisons, you can say something is different without saying something is better/worse.
    • A good place for politics is c/politicaldiscussion
  4. Posts must be original/unique
  5. Adhere to Lemmy's Code of Conduct and the TOS

If you made it this far, showerthoughts is accepting new mods. This community is generally tame so its not a lot of work, but having a few more mods would help reports get addressed a little sooner.

Whats it like to be a mod? Reports just show up as messages in your Lemmy inbox, and if a different mod has already addressed the report, the message goes away and you never worry about it.

founded 2 years ago
MODERATORS
 

We all migrate to smaller websites try not to post outside drawing attention just to hide from the "Ai" crawlers. The internet seems dead except for the few pockets we each know existed away from the clankers

top 50 comments
sorted by: hot top controversial new old
[–] daniskarma@lemmy.dbzer0.com 195 points 1 day ago (4 children)

I have a testing website. I have never gave the address to absolutely anyone, ever. It's not linked with anything. It's just a silly html site living in a domain.

It's still being ping and probed to death by bad actors. No necessarily AI scrappers. But it's dozens or hundreds of http petitions a day for random places all over the world.

There's no black forest. It's all light up and under constant attack, every tree is already on fire.

[–] dual_sport_dork@lemmy.world 93 points 1 day ago (7 children)

That's because it's numerically possible to sweep through the entire IPv4 address range fairly trivially, especially if you do it in parallel with some kind of botnet, proverbially jiggling the digital door handles of every server in the world to see if any of them happen to be unlocked.

One wonders if switching to purely IPv6 will forestall this somewhat, as the number space is multiple orders of magnitude larger. That's only security through obscurity, though, and it's certain the bots will still find you eventually. Plus, if you have a doman name the attackers already know where you are — they can just look up your DNS record, which is what DNS records are for.

[–] MyNameIsIgglePiggle@sh.itjust.works 17 points 1 day ago (1 children)

I like seeing them try and then thinking "begone thot! There is no entry for you"

In fact, I might make a honeypot that issues exactly that

[–] WhyJiffie@sh.itjust.works 4 points 18 hours ago

nepenthes is the tool for that

[–] kossa@feddit.org 9 points 1 day ago (2 children)

But an IP can have multiple websites and even not return anything on plain IP access. How do crawlers find out about domains and unlinked subdomains? Do they even?

[–] chamomile@furry.engineer 15 points 1 day ago (2 children)

@kossa @dual_sport_dork If you're using HTTPS, which is by and large the norm nowadays, then every domain is going to be trivially discoverable via certificate transparency logs: https://social.cryptography.dog/@ansuz/115592837662781553

[–] taaz@biglemmowski.win 11 points 1 day ago* (last edited 1 day ago) (1 children)

thinking about this, wouldn't the best way to hide a modern websie be something along getting a wildcard domain cert (can be done with LE with DNS challenge), cnaming the wildcard to the root domain and then hosting the website on a random subdomain string ? am I missing something

I do something something like this using wildcard certs with Let's Encrypt. Except I go one step further because my ISP blocks incoming data on common ports so I end up using an uncommon port as well.

I'm not hosting anything important and I don't need to always access to it, it's mostly just for fun for myself.

Accessing my site ends up looking like https://randomsubdomain.registered-domain-name.com:4444/

My logs only ever show my own activity. I'm sure there are downsides to using uncommon ports but I mitigate that by adjusting my personal life to not caring about being connected to my stuff at all times.

I get to have my little hobby in my own corner of the internet without the worry of bots or AI.

load more comments (1 replies)
[–] simeon@reddthat.com 4 points 1 day ago (1 children)

Every SSL certificate is publicly logged(you can see these logs e. g. under crt.sh) and you might be able to read DNS records to find new (sub)domains. The modern internet is too focused on being discoverable and transparent to make hiding an entire service(domain + servers) feasible. But things like example.com/dhusvsuahavag8wjwhsusiajaosbsh are entirely unfindable as long as they are not linked to

[–] kossa@feddit.org 5 points 23 hours ago

Random subdomain on wildcard certificate, IP written in the host file to mitigate DNS records, only given by word-to-mouth 😅.

Nobody said the uncrawled dark forest would be comfortable.

[–] kazaika@lemmy.world 8 points 1 day ago (2 children)

Servers which are meant to be secure usually are configured to not react to pings and do not give out failure responses to unauthenticated requests. This should be viable for a authenticated only walled garden type website op is suggesting, no?

load more comments (2 replies)
[–] SkyeStarfall@lemmy.blahaj.zone 4 points 17 hours ago

It's not as simple as "only security through obscurity". You could say the same thing for an encryption key of a certain length. The private key to a public key is still technically just an obscurity, but it's still impractical to actually go through the entire range

IPv6 is big enough where this obscurity becomes impractical to sweep. But of course, as you said, there may be other methods of finding your address

load more comments (3 replies)
[–] RememberTheApollo_@lemmy.world 6 points 1 day ago (1 children)

I have a DDNS setup. Pretty random site name. Nonetheless, it’s been found and constantly probed. Lots of stuff from Russia, China, a few countries in Africa, and India. A smattering of others, but those are the constant IPs that are probing or attempting logins.

[–] Croquette@sh.itjust.works 3 points 17 hours ago (1 children)

DNS only translate a string address (www.mywebsite.com) to its IP address (xxx.xxx.xxx.xxx) so that it is easier to remember.

Bots just try a range of address and they don't need to know your domain name. You could have the most unintelligible domain name in the world, bots would still ping your website because they use direct IP addresses.

[–] RememberTheApollo_@lemmy.world 2 points 13 hours ago

Yeah, that’s probably it. Just them spamming different numeric IP addresses to see if any get a hit.

[–] Aussiemandeus@aussie.zone 6 points 1 day ago (3 children)

Do you know how they find it? Is it just random input of address over and over?

[–] dual_sport_dork@lemmy.world 38 points 1 day ago

Almost certainly. There are only 4,294,967,296 possible IPv4 addresses, i.e. 4.3ish billion, which sounds like a lot but in computer terms really isn't. You can scan them in parallel, and if you're an advanced script kiddie you could even exclude ranges that you know belong to unexciting organizations like Google and Microsoft, which are probably not worth spending your time messing with.

If you had a botnet of 8,000 or so devices and employed a probably unrealistically generous timeout of 15 seconds, i.e. four attempts per minute per device, you could scan the entire IPv4 range in just a hair over 93 days and that's before excluding any known pointless address blocks. If you only spent a second on each ping you could do it in about six days.

For the sake of argument, cybercriminals are already operating botnets with upwards of 100,000 compromised machines doing their bidding. That bidding could well be (and probably is) probing random web servers for vulnerabilities. The largest confirmed botnet was the 911 S5 which contained about 19 million devices.

[–] pipe01@programming.dev 11 points 1 day ago (1 children)

I don't know exactly how they do it, but probing every ipv4 address isn't that hard

[–] kossa@feddit.org 3 points 1 day ago* (last edited 23 hours ago)

But there can be multiple websites behind one IP address?! They would not show when onhy accessing the IP. They would need to know about the domains somehow.

[–] friend_of_satan@lemmy.world 7 points 1 day ago

If it's https it's discoverable by hostname.

https://0xffsec.com/handbook/information-gathering/subdomain-enumeration/#certificate-transparency

Certificate Transparency (CT) is an Internet security standard and open-source framework for monitoring and auditing digital certificates. It creates a system of public logs to record all certificates issued by publicly trusted CAs, allowing efficient identification of mistakenly or maliciously issued certificates.

[–] taaz@biglemmowski.win 3 points 1 day ago* (last edited 1 day ago)

crt.sh and certificate transparency

[–] crandlecan@mander.xyz 42 points 1 day ago (1 children)

Fabulous insight. I think that would make me very happy. Bring back the forests! Burn down the Nazi trees!

[–] Carnelian@lemmy.world 6 points 1 day ago

That’s not just a fabulous insight, it’s a powerful revelation!

[–] SaharaMaleikuhm@feddit.org 33 points 1 day ago (3 children)

How about just living in the actual woods with no internet? Gets more tempting by the day.

[–] Aussiemandeus@aussie.zone 10 points 21 hours ago

Yeah but where i live its to damn hot

load more comments (2 replies)
[–] kazaika@lemmy.world 30 points 1 day ago (1 children)
[–] Aussiemandeus@aussie.zone 5 points 21 hours ago

Kinda yeah, it's what I thought lemmy would be, but more and more it isn't

[–] Brkdncr@lemmy.world 10 points 1 day ago (1 children)

Back in the days of dial up and bbs this was a problem but you would still get robots trying to connect to modems by dialing every phone number possible.

[–] friend_of_satan@lemmy.world 3 points 1 day ago

War dialing! Those were the days. I lived in a city where war dialing was illegal, but that didn't stop me... maybe that's just an admission of stupidity though. Definitely had some cool stuff come from it though.

[–] Hackworth@piefed.ca 10 points 1 day ago (1 children)
[–] Cooper8@feddit.online 3 points 1 day ago (1 children)

Damn, how was this not big headline news?

[–] SaharaMaleikuhm@feddit.org 5 points 1 day ago

China and Russia do this shit all the time. Now they used a new tool. It's really not big headline news. I'd love for it to be and burst that AI bubble tho.

[–] DeathByBigSad@sh.itjust.works 9 points 1 day ago (1 children)

~shhh~ ~they'll~ ~hear~ ~you!~

FUCK WE'RE TOO LATE, YOU ACTIVATED THE BOTS! YOU DOOMED US!

[–] Aussiemandeus@aussie.zone 4 points 21 hours ago

My bad, I'm sorry

[–] SanctimoniousApe@lemmings.world 7 points 1 day ago (1 children)

Isn't that what TOR-based .onion sites are for?

load more comments (1 replies)
[–] JohnnyCanuck@lemmy.ca 7 points 1 day ago (1 children)
[–] Aussiemandeus@aussie.zone 4 points 21 hours ago

Yeah it certainly is

[–] TheWeirdestCunt@lemmy.today 7 points 1 day ago (2 children)

Ah a fellow spacetime enjoyer

load more comments (2 replies)
[–] Siegfried@lemmy.world 5 points 1 day ago* (last edited 1 day ago) (1 children)

The last reduct of mankind against the machines? Let's call it Sion

[–] Aussiemandeus@aussie.zone 3 points 21 hours ago

I think you're on to something maybe make a movie

[–] NihilsineNefas@slrpnk.net 5 points 14 hours ago (1 children)

Do you think there will be safe places on the internet?

If it's connected, it's accessible. Won't matter what human level security we put in place when the datacenters these clankers run on have enough GPUs to brute force their way through.

Offline communication will make a resurgence, and will become indespensible when the resource wars the billionaires are funding reach the rest of the world.

[–] Quadrexium@sopuli.xyz 10 points 13 hours ago (1 children)

If i had to guess, maybe everything would become invite-only

[–] pcr3@lemmy.world 3 points 12 hours ago (1 children)

So like past torrent search providers, ike demoniod?

[–] Lag@lemmy.world 5 points 12 hours ago (1 children)

If the person who got invited by the person you invited gets banned, your whole family dies. It's the only way to keep people honest.

[–] Aussiemandeus@aussie.zone 2 points 10 hours ago

Internet vampires

[–] BodePlotHole@lemmy.world 5 points 13 hours ago

I was thinking the other week about how it's getting to a point that I would consider a membership fee to access something like lemmy but guaranteed no AI or bots or bullshit advertising.

I know it isn't possible, but if it was, I'd pay a small fee to have it.

[–] GuyFawkes@sh.itjust.works 5 points 1 hour ago

Morpheus, that you?

[–] Cooper8@feddit.online 4 points 1 day ago

How is Gemini fairing in the existing bot landscape? Usenet?

[–] minorkeys@lemmy.world 3 points 1 day ago (5 children)

Disconnection is the only solution, walled gardens, paid or by invite, that prevent all the shit corporate America fills the commons with.

load more comments (5 replies)
load more comments
view more: next ›