I'm not saying the explanation you propose is impossible. It isn't. It's just highly improbable. Why dont you elaborate on why you think a $1.2 Billion company with 20 years of R&D in threat identification, which was founded on the idea of identifying (email) spam, and was one of the first (maybe the originator of) "firewall in the cloud" services lacks the technical sophistication to identify legitimate connections from known VPN sources without imposing a captcha delay - a method which is, at best, of limited value in identifying bots.

"It's too complicated for them" is just not sufficient.

nostr:nevent1qqsq9hmt95c04s9yvkhgn67cd7lp6jcj3x9h6gduqqdrtkww6a67xvgppemhxue69uhkummn9ekx7mp0qgsdwz2fg4gn6qrj420z6vqvvha6xd47w500vrhvh0cd0fy8z4sagxsrqsqqqqqpr7cpre

Reply to this note

Please Login to reply.

Discussion

It’s not a matter of how well funded they are (or aren’t), or how smart and technical they are (or aren’t).

When trying to identify an “individual as an individual” online, an IP address (shared by as few people as possible) is one of the most useful pieces of information you can have in the majority of cases.

That’s why many websites ban traffic coming from Tor (no sufficient way to differentiate abusive users from regular users).

A VPN is similar (but to a lesser extent) in that it’s more difficult to differentiate individuals.

How else would a service throttle abusive incoming connections, if not by problematic IP address?