frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Open in hackernews

Our investigation into the suspicious pressure on Archive.today

https://adguard-dns.io/en/blog/archive-today-adguard-dns-block-demand.html
273•immibis•3h ago

Comments

atomicfiredoll•1h ago
I don't know anything about Adguard, but good on the team for doing the extra digging instead of just going along with the claim. Even better that they're sharing what they've found with everyone else.
hirako2000•1h ago
Yes kudo. The pressure could simply be inferred as due to the arrogant trend one can observe, the editing of history.
nikanj•1h ago
archive.is is frequently used to bypass paywalls, I wonder if this is motivated by that somehow
mattmaroon•1h ago
100%. It's like Lenin said, you look for the person who will benefit… and, uh, uh, you know… You know, you'll uh, uh—well, you know what I'm trying to say…
pimlottc•52m ago
I’m not sure what you’re referencing, but the principal goes back way back to the Romans: Cui bono? [0]

0: https://en.wikipedia.org/wiki/Cui_bono%3F

trevithick•46m ago
They're referencing this: https://m.youtube.com/watch?v=HlZhPuDYqbU
pogue•1h ago
That's most likely the reason pressure is being put on them. Big media companies successfully shutdown 12ft.io, which was used to bypass paywalls, and forced the BPC (Bypass Paywalls Chrome) browser extension off the Mozilla Extension store, then Gitlab, then Github. Now the dev is hosting it on a Russian Github clone, presumably making it untouchable.

Since archive[.]today is using some very obscure hosting methods with multiple international mirrors, it makes it incredibly difficult for law enforcement to go after.

pimlottc•51m ago
What obscure methods are they using?
pogue•24m ago
I guess it might fall under a bulletproof hosting type of setup. [1] There have been many people investigating to try and figure out who owns & operates who is actually behind archive[.]today and how they're continuously able to bypass the paywalls of paid sites, continue operating with such large infrastructure with no apparent income source.

There was quite a good article posted here on HN about someone trying to figure out those questions, but I can't seem to find it.

[1] https://en.wikipedia.org/wiki/Bulletproof_hosting

nacozarina•52m ago
DOGE is busy replacing official US govt websites, and does not want anyone bringing up the past.
jdiff•30m ago
If they were any good at it, they'd have blocked the Internet Archive via robots.txt. For some inexplicable reason, IA responds to that by wiping out past, present, and future archivals of that site. They haven't taken that easy step, so I doubt they'd go the further, more involved step of focusing on this smaller actor.
codedokode•9m ago
IA also blocks some content in Russia, for example this [1] says: "This URL has been excluded from the Wayback Machine in your region.". I was sincerely surprised to learn that while not paying much attention to US copyright law, they have high respect for messages from Vladimir.

(in an unlikely case someone is curious what about is that article, it is a fictional comparison of life of a finctional character in Springfield, USA and Chusovoy, USSR in 80s and I cannot even understand why it was banned in Russia)

[1] https://web.archive.org/web/20250418160713/https://habr.com/...

supriyo-biswas•1h ago
Its interesting that being unable to find a legal route to dig up dirt on archive.is, they're going the route of CSAM allegations.

I first heard of this technique on a discussion on Lowendtalk from a hoster discussing how pressure campaigns were orchestrated.

The host used to host VMs for a customer that was not well liked but otherwise within the bounds of free speech in the US (I guess something on the order of KF/SaSu/SF), so a given user would upload CSAM on the forum, then report the same CSAM to the hoster. They used to use the same IP address for their entire operation. When the host and the customer compared notes, they'd find about these details.

Honestly at the time I thought the story was bunk, in the age of residential proxies and VPNs and whatnot, surely whoever did this wouldn't just upload said CSAM from their own IP, but one possible explanation would be that the forum probably just blocked datacenter IPs wholesale and the person orchestrating the campaign wasn't willing to risk the legal fallout of uploading CSAM out of some regular citizen's infected device.

In this case, I assume law enforcement just sets up a website with said CSAM, gets archive.is to crawl it, and then pressurize DNS providers about it.

HeckFeck•1h ago
> I assume law enforcement just sets up a website with said CSAM

Sentences like this make me sincerely believe that not everyone has a soul.

hsbauauvhabzb•1h ago
Cocaine is a hell of a drug
attila-lendvai•1h ago
wait...! do you mean the commenter or the people in law enforcement?
mattmaroon•1h ago
I doubt they’d have to. If the site truly doesn’t remove CSAM I’ve no doubt plenty of it would end up there organically. You wouldn’t have to upload any anywhere, you’d only need to know some URLs to look for which presumably any major law enforcement agency would.
attila-lendvai•1h ago
they removed it promptly.

remember: god kills a kitten every time you comment/assume something without reading it...

Wowfunhappy•6m ago
> Please don't comment on whether someone read an article. "Did you even read the article? It mentions that" can be shortened to "The article mentions that".

https://news.ycombinator.com/newsguidelines.html

cornholio•1h ago
It's unlikely law enforcement would take the risk to handle CSAM just to make a case against a Russian pirate, jeopardizing their careers and freedom, when the copyright case is pretty strong already.

These are the doings of one of the myriad freelance "intelectual rights enforcement agents", which are paid on success and employed by some large media organization. Another possibility is that a single aggrieved individual who found themselves doxed or their criminal conviction archived etc. took action after failing to enforce their so called "right to be forgotten".

Unfortunately, archive.is operating model is uniquely vulnerable to such false flag attacks.

jordanb•26m ago
The FBI has a large archive of CSAM used for content ID:

https://cybernews.com/editorial/war-on-child-exploitation/

Of course in a pinch it could also be used for other things like pretext.

justin66•16m ago
It’s grimly hilarious that anyone in 2025 believes the police wouldn’t do something because that thing is unethical and against their own standards.

> handle CSAM

They wouldn’t “handle” it, they’d have some third party do their dirty work.

iamnothere•14m ago
This is probably the realm of intelligence agencies, who have less accountability and many reasons to eliminate public archives (primarily perception management).
amarcheschi•1h ago
I've spent enough time on telegram to see this happening more times to ban groups. Csam shit storm, content gets flagged, the group gets banned (or at least, unavailable for some time)
breppp•34m ago
That would work but it is a very risky technique. For the mere mortal in your example this means possible jail time just to get some site closed down.

For law enforcement personnel, at the very least would mean an end of a career if caught (also possible jail time)

mchanson•4m ago
You are naive about cops, at least in the US, and what they will or will not do and what consequence they may or may not face.
dude187•31m ago
It's the same technique that people on Reddit use to take down subreddits that don't agree with the carefully curated "hive mind".
iamnothere•11m ago
I don’t know why you are downvoted, this is absolutely what happened semi-frequently until Reddit was finally forced to crack down on it. The same thing happened on Twitter/X for a while where bots would mass reply to targeted users with gore and CSAM.
master_crab•1h ago
This just shows that LCEN, DMCA, etc are poorly crafted laws. They ineffectually stop the abuse they claim to end (like copyright infringement). But it does allow large organizations a cudgel to protect their own IP.
nkrisc•1h ago
I think they’re well crafted laws because I think that’s their intended purpose.
trollbridge•20m ago
“The purpose of a system is what it does.”
attila-lendvai•1h ago
...or their goal is simply not what they advertise.
marcosscriven•1h ago
The wording in that follow-up email is so emotive it reads more like a Tweet than formal contact from a federal organisation.

That in itself is quite shocking really.

xbmcuser•1h ago
I speculate, and the conspiracy theorist in me believes, something of a compromising nature has been archived and they want that data inaccessible, but at the same time, pointing out what they want hidden would shine a light on it.

It is even more interesting the US government is coming after archive.today at the same time, or maybe that is just a coincidence, and this is just a tech-savvy philanderer trying to hide something from his wife.

lsihgsligh99•1h ago
If we're speculating, there is another reason to censor archiving site - if you recently committed well documented genocide and want the evidence erased. Given the systematic removal of such content from social media, it would not be surprising if this was related.
demarq•1h ago
Finally someone does some digging
orbital-decay•1h ago
The FBI investigation might be a coincidence. Unsurprisingly, archive.today is attacked with CSAM uploads+reports all the time, you can find occasional mentions of this in their blog from 3 and 9 years ago, and I bet there was a ton of this in between.
rs186•1h ago
I still can't wrap my head around why a DNS provider is required to block websites, especially one that is not associated with ISP or used as default on any device. Oversimplifying this, it's a glorified hash map, so whoever wants to take down the illegal content should just deal with the website owner?
JKCalhoun•51m ago
Presumably they have failed to do the latter and are just reaching at this point.
codedokode•59m ago
I used the site several times to archive some page or send it to someone who cannot access the site directly. I never archived anything illegal and never stumbled upon illegal things there. So I don't know why they want to arrest the owner.

Also the site is pretty advanced, it can handle complicated sites and even social networks.

> But because it can also be used to bypass paywalls

How? Does the site pay for subscription for every newspaper?

> Unfortunately, we couldn’t dig any deeper about who exactly is behind WAAD.

That's a red flag. Why would an NGO doing work for the public hide its founder(s) and information about itself? Using NGOs to suggest/promote/lobby certain decisions is a well known trick in authoritarian countries to pretend the idea is coming from "the people", not from the government. I hope nobody falls for such tricks today.

Furthermore, they seem to have no way to donate them money. That's even the redder flag.

Also France doesn't have a good reputation in relation to the observing rule of law. For example, they arrested Russian agent^w enterpreneur Durov, owner of Telegram, claiming they have lot of evidence against him involved in drug trafficking, fraud and money laundering [1], but a year later let him free (supposedly after he did what they wanted). France also bars popular unwanted candidates from elections. Both these cases strongly resemble what Russia does.

[1] https://en.wikipedia.org/wiki/Arrest_and_indictment_of_Pavel...

pards•13m ago
>> But because it can also be used to bypass paywalls

> How? Does the site pay for subscription for every newspaper?

Someone with a subscription logs into the site, then archives it. Archive.is uses the current user's session and can therefore see the paywalled content.

everythingever•59m ago
On behalf of all Indians I apologize. An Indian who read the email you received would be able to quickly guess that email originated from India. We are the global hub of scam call centers. We also write emails just like in that text. Run the text of that email via LLM. Ask the LLM: How likely is it that this email is a scam from India? Answer:80%
harvey9•25m ago
You don't need to apologise for something you didn't do just because it happened in your country.
M0r13n•49m ago
A few weeks ago I noticed DNS4EU couldn’t resolve archive.is and assumed it was just a configuration mistake. I emailed them about it, and after a couple of days or weeks (not really sure) the domain started resolving again. Given AdGuard’s recent report about suspicious pressure on DNS providers to block Archive.today, I’m starting to wonder if DNS4EU’s temporary block was actually related to the same campaign
A_Venom_Roll•47m ago
Archive.is doesn't work on all sites to bypass the paywall. Media companies that are truly concerned about this should modify their paywall configuration.
Plasmoid2000ad•5m ago
I've seen some theories or maybe more like guesses as to how the paywall bypass works - I don't think anyone (or at least no one posting places like here) seems to know.

One I saw suggested they've a set of subscriptions to the paywalled sites and some minimal custom work to hide the signed in account used - which seems plausible. That makes the defense most likely used to catch the account used and ban them - which would be a right pain.

nrhrjrjrjtntbt•44m ago
https://archive.is/Nirff
Havoc•16m ago
The amount of forces seemingly actively trying to kill the internet of old is disconcerting.

Chat control, DNS as arbiter of whats allowed, walled gardens etc.

anal_reactor•4m ago
Different question, but what are realistic use cases of archive.today that could be interesting for average person?

Kagi Bloopers – Search Results Gone Wrong

https://help.kagi.com/kagi/bloopers/
36•embedding-shape•1h ago•3 comments

Our investigation into the suspicious pressure on Archive.today

https://adguard-dns.io/en/blog/archive-today-adguard-dns-block-demand.html
280•immibis•3h ago•49 comments

The Internet Is Cool. Thank You, TCP

https://cefboud.com/posts/tcp-deep-dive-internals/
128•signa11•7h ago•58 comments

AI World Clocks

https://clocks.brianmoore.com/
1110•waxpancake•19h ago•328 comments

AMD GPUs Go Brrr

https://hazyresearch.stanford.edu/blog/2025-11-09-amd-brr
203•vinhnx•11h ago•61 comments

Messing with Scraper Bots

https://herman.bearblog.dev/messing-with-bots/
76•HermanMartinus•6h ago•29 comments

Can text be made to sound more than just its words? (2022)

https://arxiv.org/abs/2202.10631
18•tobr•1w ago•11 comments

Unofficial Microsoft Teams client for Linux

https://github.com/IsmaelMartinez/teams-for-linux
166•basemi•1w ago•150 comments

Activeloop (YC S18) Is Hiring MTS(Back End)and AI Search Engineer

https://careers.activeloop.ai/
1•davidbuniat•1h ago

Spec-Driven Development: The Waterfall Strikes Back

https://marmelab.com/blog/2025/11/12/spec-driven-development-waterfall-strikes-back.html
140•vinhnx•5h ago•121 comments

A new Google model is nearly perfect on automated handwriting recognition

https://generativehistory.substack.com/p/has-google-quietly-solved-two-of
374•scrlk•3d ago•208 comments

Löb and Möb: Loops in Haskell (2013)

https://github.com/quchen/articles/blob/master/loeb-moeb.md
58•fanf2•1w ago•10 comments

Streaming AI Agent Desktops with Gaming Protocols

https://blog.helix.ml/p/technical-deep-dive-on-streaming
6•quesobob•1w ago•0 comments

SSL Configuration Generator

https://ssl-config.mozilla.org/
192•smartmic•15h ago•55 comments

Lawmakers want to ban VPNs and have no idea what they're doing

https://www.eff.org/deeplinks/2025/11/lawmakers-want-ban-vpns-and-they-have-no-idea-what-theyre-d...
318•gslin•1d ago•158 comments

HipKittens: Fast and furious AMD kernels

https://hazyresearch.stanford.edu/blog/2025-11-09-hk
194•dataminer•1d ago•59 comments

So, you want to design your own language? (2017)

https://cs.lmu.edu/~ray/notes/languagedesignnotes/
93•veqq•7h ago•65 comments

'No One Lives Forever' turns 25 and you still can't buy it legitimately

https://www.techdirt.com/2025/11/13/no-one-lives-forever-turns-25-you-still-cant-buy-it-legitimat...
283•speckx•21h ago•150 comments

All praise to the lunch ladies

https://bittersoutherner.com/issue-no-12/all-praise-to-the-lunch-ladies
204•gmays•17h ago•121 comments

Continuous Architecture: A decade of designing for change

https://continuousarchitecture.com/2025/11/04/a-decade-of-ca/
13•gHeadphone•1w ago•1 comments

Random Font – a typographic experiment exploring randomness [pdf]

https://www.ilcovile.it/scritti/COVILE_834_Reprint_Random_Font.pdf
26•misone•1w ago•8 comments

Structured outputs on the Claude Developer Platform

https://www.claude.com/blog/structured-outputs-on-the-claude-developer-platform
156•adocomplete•18h ago•65 comments

No Leak, No Problem – Bypassing ASLR with a ROP Chain to Gain RCE

https://modzero.com/en/blog/no-leak-no-problem/
86•todsacerdoti•14h ago•6 comments

Driving TFEL with RP2040: Offloading the CPU step by step (2021)

https://www.zephray.me/post/rpi_pico_driving_el/
11•starkparker•6d ago•0 comments

Winamp clone in Swift for macOS

https://github.com/mgreenwood1001/winamp
240•hyperbole•1d ago•144 comments

A race condition in Aurora RDS

https://hightouch.com/blog/uncovering-a-race-condition-in-aurora-rds
230•theanomaly•19h ago•70 comments

Async Mutexes

https://matklad.github.io/2025/11/04/on-async-mutexes.html
48•ingve•1w ago•13 comments

Ucs-Detect

https://ucs-detect.readthedocs.io/intro.html
21•djoldman•1w ago•9 comments

The disguised return of EU Chat Control

https://reclaimthenet.org/the-disguised-return-of-the-eus-private-message-scanning-plot
736•egorfine•19h ago•272 comments

Blending SQL and Python with Sqlorm

https://hyperflask.dev/blog/2025/11/11/blending-sql-and-python-with-sqlorm/
17•emixam•4d ago•5 comments