Browsers based on chromium do not have to follow exactly what the main branch is doing. If they want to keep supporting MV2 or support different rules for MV3, they can. Albeit it’s a bit cumbersome.
Unfortunately, I think that while ad blockers won’t work as well, they will still work good enough that most won’t bother making the switch.
https://blog.getadblock.com/how-adblock-is-getting-ready-for-manifest-v3-6cf21a7884f6
https://github.com/uBlockOrigin/uBOL-home/wiki/
https://adguard.com/en/blog/adguard-mv3.html
https://www.reddit.com/r/uBlockOrigin/comments/1067als/comment/j3h00xj/
The main issue I see is the slow update of filters (which require an extension update). This might make YouTube win the cat and mouse game. Where YouTube updates(ed?) their blocking detection multiple time a day.
It would be crazy expensive to run an attack of this size for years.
There is no way a DDoS on the website in affecting the crawler. Also, running a DDoS attack of this size costs a lot of money (if you rent the network, if you own it it costs money as lost sales). No one is giving AI control over a DDoS network to just fuck around.
There is no domain name associated with the IPs.
Most importantly, usually, DDoS attacks use infected devices (PCs, mobile phones, smart fridges, shady browser addons etc…) to get many ip addresses and devices/locations and attack from everywhere at once.
I think you meant this one: https://m.youtube.com/watch?v=8JrqH2oOTK4
When using a browser they can get your user agent (https://www.whatsmyua.info) They can also get some information about your device, like pixel resolution, screen size (https://www.whatismyscreenresolution.org), gpu (https://hardwaretester.com/gpu) etc…
All of those data combined make a fingerprint for your browser, that can be more or less unique.
I recommend having a look here for more information about how fingerprinting works and how to protect from it, and to see how “unique” your browser is (https://coveryourtracks.eff.org).
When using an app, it’s a whole lot more complicated to escape from it, but one step I can recommend, is to delete your phone advertisement id (https://www.eff.org/deeplinks/2022/05/how-disable-ad-id-tracking-ios-and-android-and-why-you-should-do-it-now).
That been said, from my own reddit gdpr export, it doesn’t look like reddit is doing any fingerprinting of that sort. I haven’t looked so close at it yet, however.
LibreTube is also a good one. Basically an app for piped