It's still possible to use XPrivacyLua (https://github.com/M66B/XPrivacyLua) with passing SafetyNet. It's a cat-and-mouse game, but the community is still ahead.
* Unless you get an Evil Maid attack [0], like adding a physical keylogger to the keyboard bus.
If the device is decrypted but on lock screen (like with TPM) there are more options, the main one is reading memory via DMA [1] on an ExpressCard slot (eg the wifi card). Also swapping out the memory to do a cold boot attack [2] is possible.
Actually, attacks using Thunderbolt PCIe capabilities are too much realistic that it is no longer funny (and it is not just a security bug, its a real feature).
I've been using this extension for long time and it has changed my relationship to video content. I still prefer text to skim through and read at my own pace, but having keyboard shortcuts for video that work across all pages changes the game.
Long talks no longer seem daunting because speeding up and rewinding becomes like a second nature. I use the speed step of 0.1x and rewind step of 3 seconds for fine control, the default values were too imprecise. Maybe I should start slowing down songs I enjoy?
This is a good idea, actually -- make it impossible to distinguish a banned request from a succesful request. At least that could delay the discovery period, as would randomizing the request limit.
I've wondered if a web server or proxy in something like Erlang would be ideal there, where there is little server-side penalty in dragging requests out progressively longer.
With the lightweight processes, the cost per should be very, very low, and basically make it easier to Turing tarpit the scammers.