While I do really like the idea of off-grid networks in general but for this use case, is it really that hard for a state actor to jam Bluetooth (or all ~2.4GHz communication) on a large scale?
My problem is that when you are actually locally near someone you don't really need live chat; and if you're far, it might become too unstable to use.
But I might be wrong!
A name that can be named is not The Name
Tao is both Named and Nameless As Nameless, it is the origin of all things As Named, it is the mother of all things
A mind free of thought, merged within itself, beholds the essence of Tao
A mind filled with thought, identified with its own perceptions, beholds the mere forms of this world
1. Browser fingerprinting or ip bans. They used advanced fingerprint-shifting browsers and residential proxy ips.
2. Phone number 2FA. Significantly slowed legitimate user access but still didn't fully stop credential stuffers.
What did work:
3. rate limits and carefully tailored scripts that detected usage patterns and autobanned. Eventually they gave up on us guess wasn't worth the trouble. However I'm sure we lost a few legitimate users too in the process.
What I would try in the future:
- Passkeys as 2fa. Most browser automation platforms can't handle passkey auth inside a VM.