Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

There are options beyond auth walls for detecting/enforcing behavior as well since these scrapers have very recognizable device signatures: https://stytch.com/blog/detecting-ai-agent-use-abuse/


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: