These "clicks" are likely identified as fraudulent and dropped by the ad network. So you still pay the cost of downloading and running all the advertising JS and you still get tracked by the ad networks, all for nothing.
These "clicks" are likely identified as fraudulent and dropped by the ad network. So you still pay the cost of downloading and running all the advertising JS and you still get tracked by the ad networks, all for nothing.
https://github.com/dhowe/AdNauseam/wiki/FAQ#how-does-adnause...
You seem more knowledgeable in how browsers and js work than me. Does the below text still mean that AdNausem is downloading and running all the advertising JS?
Here's what's in the link: >AdNauseam 'clicks' Ads by issuing an HTTP request to the URL to which they lead. In current versions this is done via an XMLHttpRequest (or AJAX request) issued in a background process. This lightweight request signals a 'click' on the server responsible for the Ad, but does so without opening any additional windows or pages on your computer. Further it allows AdNauseam to safely receive and discard the resulting response data, rather than executing it in the browser, thus preventing a range of potential security problems (ransomware, rogue Javascript or Flash code, XSS-attacks, etc.) caused by malfunctioning or malicious Ads.
Basically zero ads are just static images with a link, they're dynamically loaded by JS when you open the page. The JS collects as much tracking data about you as it can, sends that off to the ad network servers which run a live auction to determine who will pay the most to show an ad to you right now, then returns that ad for the JS to display.
AdNauseam not loading the response to the "click" request makes it trivially easy to flag as fraudulent, because a real click would load and run the response.
What metrics does the ad network use to identify the clicks as "fraudulent"?
The same metrics any site uses to identify bot behavior. It's a closely guarded secret because if the attackers knew what metrics they used the attackers would know how to not get caught.
Another reply pointed out that AdNauseam just makes an http request to simulate a "click" and throws away the response. A real click would load and execute the response so it's trivially easy for ad networks to detect AdNauseam "clicks".