<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: mcstempel</title><link>https://news.ycombinator.com/user?id=mcstempel</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Fri, 01 May 2026 21:58:05 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=mcstempel" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[How to block AI web crawlers]]></title><description><![CDATA[
<p>Article URL: <a href="https://stytch.com/blog/how-to-block-ai-web-crawlers/">https://stytch.com/blog/how-to-block-ai-web-crawlers/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=44061587">https://news.ycombinator.com/item?id=44061587</a></p>
<p>Points: 7</p>
<p># Comments: 0</p>
]]></description><pubDate>Thu, 22 May 2025 12:55:35 +0000</pubDate><link>https://stytch.com/blog/how-to-block-ai-web-crawlers/</link><dc:creator>mcstempel</dc:creator><comments>https://news.ycombinator.com/item?id=44061587</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44061587</guid></item><item><title><![CDATA[Mcp-scan: NPM-audit-style security scanner for MCPs]]></title><description><![CDATA[
<p>Article URL: <a href="https://stytch.com/blog/mcp-scan/">https://stytch.com/blog/mcp-scan/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=43908858">https://news.ycombinator.com/item?id=43908858</a></p>
<p>Points: 2</p>
<p># Comments: 0</p>
]]></description><pubDate>Tue, 06 May 2025 19:41:33 +0000</pubDate><link>https://stytch.com/blog/mcp-scan/</link><dc:creator>mcstempel</dc:creator><comments>https://news.ycombinator.com/item?id=43908858</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43908858</guid></item><item><title><![CDATA[New comment by mcstempel in "FOSS infrastructure is under attack by AI companies"]]></title><description><![CDATA[
<p>There are options beyond auth walls for detecting/enforcing behavior as well since these scrapers have very recognizable device signatures: <a href="https://stytch.com/blog/detecting-ai-agent-use-abuse/" rel="nofollow">https://stytch.com/blog/detecting-ai-agent-use-abuse/</a></p>
]]></description><pubDate>Thu, 20 Mar 2025 16:42:31 +0000</pubDate><link>https://news.ycombinator.com/item?id=43425550</link><dc:creator>mcstempel</dc:creator><comments>https://news.ycombinator.com/item?id=43425550</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43425550</guid></item><item><title><![CDATA[New comment by mcstempel in "Untangling AI Agent authn/authz"]]></title><description><![CDATA[
<p>thanks for sharing!</p>
]]></description><pubDate>Fri, 21 Feb 2025 16:28:39 +0000</pubDate><link>https://news.ycombinator.com/item?id=43129453</link><dc:creator>mcstempel</dc:creator><comments>https://news.ycombinator.com/item?id=43129453</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43129453</guid></item><item><title><![CDATA[New comment by mcstempel in "Show HN: Immersive Gaussian Splat experience of Sutro Tower, San Francisco"]]></title><description><![CDATA[
<p>wow, this is wonderfully made</p>
]]></description><pubDate>Thu, 20 Feb 2025 23:37:05 +0000</pubDate><link>https://news.ycombinator.com/item?id=43121989</link><dc:creator>mcstempel</dc:creator><comments>https://news.ycombinator.com/item?id=43121989</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43121989</guid></item><item><title><![CDATA[New comment by mcstempel in "Detecting AI agent use and abuse"]]></title><description><![CDATA[
<p>Ah, this is great feedback -- I don't think we do enough to articulate how much we're doing beyond that simplified explanation of device fingerprinting on those docs. I'll get that page updated, but 2 main things worth mentioning:<p>1. We have a few proprietary fingerprint methods that we don't publicly list (but do share with our customers under NDA), which feed into our ML-based browser detection that assesses those fingerprint data points against the entire historical archives of every browser version that has been released, which allows us to discern subtle deception indicators. Even sophisticated attackers find it difficult to figure out what we're fingerprinting on here, which is one reason we don't publicly document it.<p>2. For a manual attacker running attacks within a legitimate browser, our Intelligent Rate Limiting (IntRL) tracks and rate-limits at the device level, making it effective against attackers using a real browser on their own machine. Unlike traditional rate limiting that relies on brute traits like IP, IntRL uses the combo of browser, hardware, and network fingerprints to detect repeat offenders—even if they clear cookies or switch networks. This ensures that even human-operated, low-frequency attacks get flagged over time, without blocking legitimate users on shared networks.</p>
]]></description><pubDate>Fri, 14 Feb 2025 19:58:09 +0000</pubDate><link>https://news.ycombinator.com/item?id=43052406</link><dc:creator>mcstempel</dc:creator><comments>https://news.ycombinator.com/item?id=43052406</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43052406</guid></item><item><title><![CDATA[New comment by mcstempel in "Detecting AI agent use and abuse"]]></title><description><![CDATA[
<p>CAPTCHAs have been ineffective as a true "bot detection" technique for a while as tools like anti-captcha.com allow for outsourcing it to real humans. BUT they have been successful at the economic side of raising the cost of programmatic traffic on your site (which is good enough for some use cases)<p>As the author of this agent detection post, we agree that CAPTCHA and vanilla browser/device fingerprinting is quickly not going to be very valuable in isolation, but we still see a lot of value in advanced network/device/browser fingerprinting<p>The main reason is that the underlying corpus & specificity of browser/device/network data points you get from fingerprinting makes it much easier to build more robust systems on top of it than a binary CAPTCHA challenge. For us, we've found it very useful to still have all of the foundational fingerprinting data as a primitive because it let us build a comprehensive historical database of genuine browser signatures to train our ML models to detect subtle emulations, which can reliably distinguish between authentic browsers and agent-driven imitations<p>That works really well for the OpenAI/BrowserBase models. Where that gets tricky is the computer-use agents where it's actually putting its hands on your keyboard and driving your real browser. Still though, it's valuable to have the underlying fingerprinting data points because you can still create intelligent rate limits on particular device characteristics and increase the cost of an attack by forcing the actor to buy additional hardware to run it</p>
]]></description><pubDate>Fri, 14 Feb 2025 18:53:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=43051729</link><dc:creator>mcstempel</dc:creator><comments>https://news.ycombinator.com/item?id=43051729</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43051729</guid></item><item><title><![CDATA[New comment by mcstempel in "Detecting AI agent use and abuse"]]></title><description><![CDATA[
<p>You read our mind! <a href="https://stytch.com/blog/the-age-of-agent-experience/" rel="nofollow">https://stytch.com/blog/the-age-of-agent-experience/</a><p>Very much agreed that's the long-term goal, but I think we'll live in a world where most apps don't support oauth for a while longer (though I'd love for all of them to -- we're actually announcing something next week that makes this easy for any app to do)<p>But we're also envisioning an interim period where users are delegating to unsanctioned external agents (e.g. OpenAI Operator, Anthropic Computer Use API, etc.) prior to apps catching up and offering proper oauth</p>
]]></description><pubDate>Fri, 14 Feb 2025 17:41:44 +0000</pubDate><link>https://news.ycombinator.com/item?id=43050874</link><dc:creator>mcstempel</dc:creator><comments>https://news.ycombinator.com/item?id=43050874</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43050874</guid></item><item><title><![CDATA[New comment by mcstempel in "Detecting AI agent use and abuse"]]></title><description><![CDATA[
<p>LinkedIn always hits me with those frustrating custom CAPTCHAs where you have to rotate the shape 65 degrees -- they've taken a pretty blunt, high-friction approach to bot detection<p>I think most apps should primarily start with just monitoring for agentic traffic so they can start to better understand the emergent behaviors they're performing (it might tell folks where they actually need real APIs for example), and then go from there</p>
]]></description><pubDate>Fri, 14 Feb 2025 17:29:17 +0000</pubDate><link>https://news.ycombinator.com/item?id=43050706</link><dc:creator>mcstempel</dc:creator><comments>https://news.ycombinator.com/item?id=43050706</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43050706</guid></item><item><title><![CDATA[New comment by mcstempel in "Detecting AI agent use and abuse"]]></title><description><![CDATA[
<p>Hey there, I'm the author of the post. I'm actually pretty sympathetic to your viewpoint, and I wanted to clarify my stance.<p>I actually spent years working at a "good bot" company (Plaid), which focused on making users' financial data portable. The main reason Plaid existed was that banks made it hard for users to permission their data to other apps -- typically not solely out of security concerns, but to also actively limit competition. So, I know how the "bot detection" argument can be weaponized in unideal ways.<p>That said, I think it’s reasonable for app developers to decide how their services are consumed (there are real cost drivers many have to think about) -- which includes the ability to have monitoring & guardrails in place for riskier traffic. If an app couldn't detect good bots, that app also can't do things like 1) support necessary revocation mechanisms for end users if they want to clawback agent permissions or 2) require human-in-the-loop authorization for sensitive actions. Main thing I care about is that AI agent use remains safe and aligned with user intent. For your example of an anonymous read-only site (e.g. blog), I'm less worried about that than an AI agent with read-write access on behalf of a real human's account.<p>My idealistic long-term view though is that supporting AI agent use cases will eventually become table stakes. Users will gravitate toward services that let them automate tedious tasks and integrate AI assistants into their workflows. Companies that resist this trend may find themselves at a competitive disadvantage. Ultimately, this has started to happen with banking & OAuth, though pretty slowly.</p>
]]></description><pubDate>Fri, 14 Feb 2025 17:21:49 +0000</pubDate><link>https://news.ycombinator.com/item?id=43050638</link><dc:creator>mcstempel</dc:creator><comments>https://news.ycombinator.com/item?id=43050638</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43050638</guid></item><item><title><![CDATA[New comment by mcstempel in "Auth0 OSS alternative Ory Kratos now with passwordless and SMS support"]]></title><description><![CDATA[
<p>We built Stytch's B2B SaaS solution with this specific shortcoming in mind -- most other solutions aren't actually built with an organization-first data model (they're user-first like Auth0 but support the general concept of orgs), which makes it difficult to offer those per organization controls in an ergonomic manner.<p>There's some more info on our multi-tenancy data model here (<a href="https://stytch.com/docs/b2b/guides/multi-tenancy" rel="nofollow">https://stytch.com/docs/b2b/guides/multi-tenancy</a>), and here's the PUT request you'd use to manage any of those org configurations: <a href="https://stytch.com/docs/b2b/api/update-organization" rel="nofollow">https://stytch.com/docs/b2b/api/update-organization</a></p>
]]></description><pubDate>Thu, 22 Feb 2024 17:21:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=39470158</link><dc:creator>mcstempel</dc:creator><comments>https://news.ycombinator.com/item?id=39470158</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=39470158</guid></item><item><title><![CDATA[New comment by mcstempel in "Passkey support in 1Password out of beta"]]></title><description><![CDATA[
<p>You can now set up passkeys on your personal gmail, which I've found to be particularly nice for times when I'm trying to log in via webview</p>
]]></description><pubDate>Thu, 14 Sep 2023 23:30:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=37516196</link><dc:creator>mcstempel</dc:creator><comments>https://news.ycombinator.com/item?id=37516196</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37516196</guid></item><item><title><![CDATA[New comment by mcstempel in "ChangeDetection, monitor any website change"]]></title><description><![CDATA[
<p>Yeah, +1. Even vanilla puppeteer is pretty successful against Cloudflare</p>
]]></description><pubDate>Fri, 01 Sep 2023 21:31:24 +0000</pubDate><link>https://news.ycombinator.com/item?id=37356392</link><dc:creator>mcstempel</dc:creator><comments>https://news.ycombinator.com/item?id=37356392</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37356392</guid></item><item><title><![CDATA[New comment by mcstempel in "The low, low cost of committing cybercrime"]]></title><description><![CDATA[
<p>To your point, the market will decide, but I'm hopeful passkeys will ultimately be one of the key solutions here. Already seeing a lot more app adoption (e.g. Shopify, Google, Docusign) than original webauthn given some of the UX problems that brought with it</p>
]]></description><pubDate>Fri, 01 Sep 2023 21:28:06 +0000</pubDate><link>https://news.ycombinator.com/item?id=37356359</link><dc:creator>mcstempel</dc:creator><comments>https://news.ycombinator.com/item?id=37356359</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37356359</guid></item><item><title><![CDATA[New comment by mcstempel in "Best Authentication Cloud Service Providers (CSPs) for a Web-Serverless Stack?"]]></title><description><![CDATA[
<p>Co-founder of Stytch (<a href="http://stytch.com/" rel="nofollow noreferrer">http://stytch.com/</a>) here -- would love to see if you think we're a fit. We have a generous free tier and we're more reasonably priced that tools like Auth0, but not as cheap as tools like Cognito + Firebase auth. If pricing is a concern, would love your feedback on your optimal cost-structure as we have some startup programs and are always looking to make pricing more compelling for early-stage projects.</p>
]]></description><pubDate>Thu, 31 Aug 2023 23:56:02 +0000</pubDate><link>https://news.ycombinator.com/item?id=37345092</link><dc:creator>mcstempel</dc:creator><comments>https://news.ycombinator.com/item?id=37345092</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37345092</guid></item><item><title><![CDATA[FingerprintJS Transitioning from MIT to Business Source License]]></title><description><![CDATA[
<p>Article URL: <a href="https://fingerprint.com/blog/fingerprintjs-license-change/">https://fingerprint.com/blog/fingerprintjs-license-change/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=36885606">https://news.ycombinator.com/item?id=36885606</a></p>
<p>Points: 2</p>
<p># Comments: 0</p>
]]></description><pubDate>Wed, 26 Jul 2023 21:50:09 +0000</pubDate><link>https://fingerprint.com/blog/fingerprintjs-license-change/</link><dc:creator>mcstempel</dc:creator><comments>https://news.ycombinator.com/item?id=36885606</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=36885606</guid></item><item><title><![CDATA[New comment by mcstempel in "Simplicity can become a false idol in SaaS pricing"]]></title><description><![CDATA[
<p>TL;DR as a dev tools company, we took a lot of inspiration from how Stripe built their product, including their very simple approach to self-serve pricing. However, we found there are some key reasons this approach doesn't translate well to our market and actually led to worse customer outcomes overall.<p>By removing some of the simplicity in our pricing model, we were able to reduce costs for 90% of our pay-as-you-go customer base.</p>
]]></description><pubDate>Mon, 24 Apr 2023 16:10:11 +0000</pubDate><link>https://news.ycombinator.com/item?id=35689464</link><dc:creator>mcstempel</dc:creator><comments>https://news.ycombinator.com/item?id=35689464</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=35689464</guid></item><item><title><![CDATA[Simplicity can become a false idol in SaaS pricing]]></title><description><![CDATA[
<p>Article URL: <a href="https://stytch.com/blog/announcing-new-pricing-and-self-serve-options/">https://stytch.com/blog/announcing-new-pricing-and-self-serve-options/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=35689463">https://news.ycombinator.com/item?id=35689463</a></p>
<p>Points: 6</p>
<p># Comments: 1</p>
]]></description><pubDate>Mon, 24 Apr 2023 16:10:10 +0000</pubDate><link>https://stytch.com/blog/announcing-new-pricing-and-self-serve-options/</link><dc:creator>mcstempel</dc:creator><comments>https://news.ycombinator.com/item?id=35689463</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=35689463</guid></item><item><title><![CDATA[New comment by mcstempel in "Things I learned after getting users"]]></title><description><![CDATA[
<p>> this worked for a little bit longer, but he proceeded to get on a VPN, and then another when i blocked that IP, then another when i blocked that IP, etc, etc.<p>Beyond VPNs, I've even seen attackers leverage residential IP networks which makes VPN detection ineffective as well [1]. If you ever need a more permanent identifier to ban users on, consider using a device/browser fingerprinting tool [2]. It helps avoid the whack-a-mole issue of more sophisticated attackers churning IPs/emails/user agents/etc.<p>[1] <a href="https://brightdata.com/proxy-types/residential-proxies" rel="nofollow">https://brightdata.com/proxy-types/residential-proxies</a>
[2] <a href="https://stytch.com/products/device-fingerprinting" rel="nofollow">https://stytch.com/products/device-fingerprinting</a> (I'm admittedly biased towards our solution as I work at Stytch)</p>
]]></description><pubDate>Mon, 13 Mar 2023 22:36:06 +0000</pubDate><link>https://news.ycombinator.com/item?id=35144066</link><dc:creator>mcstempel</dc:creator><comments>https://news.ycombinator.com/item?id=35144066</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=35144066</guid></item><item><title><![CDATA[New comment by mcstempel in "Twilio’s toll fraud problem"]]></title><description><![CDATA[
<p>Also, a tip for anyone that feels like the low hanging fruit prevention methods aren't working (e.g. CAPTCHA, rate limits, etc.)<p>Consider installing a device fingerprinting system -- this has be the single most effective solution we've seen our customers integrate for more sophisticated bot problems: <a href="https://stytch.com/docs/fraud#device-fingerprinting" rel="nofollow">https://stytch.com/docs/fraud#device-fingerprinting</a>. I'd recommend against the off-the-shelf solutions (e.g. open source ones) because many of them are easily reverse engineered, so they work well for low-level threats but not for persistent ones. In addition to our solution, Arkose and Fingerprint Pro are a couple ones I'm aware of</p>
]]></description><pubDate>Fri, 06 Jan 2023 00:19:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=34269051</link><dc:creator>mcstempel</dc:creator><comments>https://news.ycombinator.com/item?id=34269051</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=34269051</guid></item></channel></rss>