• jet@hackertalks.com
    link
    fedilink
    English
    arrow-up
    0
    ·
    5 months ago

    Surprised they use real phones for this, I would think VMs and VPNs would be the most scalable.

    • cmhe@lemmy.world
      link
      fedilink
      arrow-up
      0
      ·
      5 months ago

      Since their usage is probably forbidden my the TOS of the platforms they use, and the platforms will try to detect this kind of usage and ban users, I would assume that the closer they appear like natural usage, the more effective they are.

      Running these apps on a emulator and using VPNs etc. will probably be a red flag.