this post was submitted on 01 Dec 2025
1184 points (99.7% liked)

Microblog Memes

9797 readers
1527 users here now

A place to share screenshots of Microblog posts, whether from Mastodon, tumblr, ~~Twitter~~ X, KBin, Threads or elsewhere.

Created as an evolution of White People Twitter and other tweet-capture subreddits.

Rules:

  1. Please put at least one word relevant to the post in the post title.
  2. Be nice.
  3. No advertising, brand promotion or guerilla marketing.
  4. Posters are encouraged to link to the toot or tweet etc in the description of posts.

Related communities:

founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] henfredemars@infosec.pub 8 points 4 days ago (2 children)

How odd. I have never heard of .world filtering based on VPN usage, although it's been some time since I used that instance regularly.

[–] Z3k3@lemmy.world 11 points 4 days ago* (last edited 4 days ago) (1 children)

I can read without issue but more often than not posting comments or indeed posts fails unless I pause for 5 mins.

E. This went through without disconnecting as an example. Can't figure out if threshold a pattern

[–] io@piefed.blahaj.zone 4 points 4 days ago

maybe the particular server of the vpn haz problems? have your tried switching that around?

[–] moseschrute@lemmy.world 2 points 3 days ago (1 children)

In my experience, many Lemmy instances block what looks like bot traffic. I don’t think it’s as simple as VPN = blocked, but that’s probably one of the signals they pay attention to. I’ve noticed most comments will fail to post when I’m using Mullvad.

[–] chilicheeselies@lemmy.world 1 points 3 days ago (1 children)

Yeah its usually certain ip addreses that got abused and are now flagged

[–] moseschrute@lemmy.world 1 points 3 days ago* (last edited 3 days ago)

I’m totally guessing but I’m guessing it’s more similar to:

  • Accessing from a business owned IP: +20% risk of abuse
  • Accessing from C country: +10% risk of abuse
  • The rate that you’re making requests: +5% risk of abuse
  • Etc

Block if risk of abuse exceeded X%

I have no idea what I’m talking about, but I can’t imagine these companies aren’t using some pretty advanced detection of bot traffic