educational

SEO Spam: The Facts About Cloaking

Cloaking is the technique of returning different pages according to who or what is requesting them; e.g. a surfer would receive the actual page whereas a search engine spider would receive a different page, but would assume that it is the actual page that surfers see. Here's a look at some of the details:

The purposes of cloaking for search engine optimization are to hide highly optimized pages from people, so that they can't be stolen, and to provide search engine spiders with highly optimized pages that wouldn't look particularly good in browsers.

There are three ways of cloaking. One is "IP delivery", where the IP addresses of spiders are recognized at the server and handled accordingly; another is "User-Agent delivery", where the spiders' User-Agents are recognized, and the third is the first two combined.

Is cloaking ethical?
Let me put it this way: Search engines do it all the time. For instance, Google delivers different pages according to where in the world the surfer is located. People in the UK receive AdWord advertisements that are relative to the UK, and people in the U.S. receive AdWords that are relative to the U.S. Google delivers different pages according to the surfer's IP address. That's IP delivery, and that's cloaking.

Also, from time to time, search engines prevent certain people from gaining access to their .com versions. Instead, by checking the surfers' IP addresses, they redirect people to their localized versions - even when the surfers really do want to go to the .com version! Again, that's IP delivery, and that's cloaking.

Because the search engines do it, it is clear that cloaking isn't intrinsically unethical or wrong. If it's ok for the search engines to do it, then it must be ok for everyone else to do it. So what is it about cloaking that some people are dead against?

There is no sensible answer to that. The general idea is that serving people one page and serving the search engines a different page is simply wrong, because the engines are ranking the page according to what they believe it to be and not according to what it actually is. That idea is purely a matter of principle, and nothing at all to do with common sense.

The common sense view is that, if a page is ranked correctly, according to its topic, then surfers will find it in the search results, click on it and go to exactly where they expect to go to from reading the listing in the search results. It doesn't matter how the page came to be ranked in that position, and it doesn't matter if another page took its place when the engine was evaluating it. As long as it is ranked correctly, according to its topic, surfers are perfectly happy.

The fact that cloaking can be used to send people to sites and topics that they did not expect to go to when clicking on a listing in the search results, is an excellent reason to be against the misuse of cloaking, but it is no reason at all to be against the cloaking technique in general.

How Cloaking Actually Helps Google
Google's crawlers won't spider pages that have anything that looks like Session IDs in their URLs. If they did, they run the risk of spidering a potentially infinite number of pages, because each page that is requested would contain links to other pages, and the link URLs would contain the current session ID, which makes them different URLs than the last time the page was requested. And so it would go on and on and on, producing a vast number of unique URLs to spider and index.

It means that Google won't spider most of the pages on some websites. But Google actually wants to spider most or all of each website's pages. The solution is to cloak the pages. By spotting page requests from the Google spiders, and delivering modified pages without the normal Session IDs in the link URLs, Google is able to spider all of a site's pages. This is precisely what Google wants, it's what the website owner wants and, if asked, it would be what surfers want. It helps everybody and harms no-one.

This example alone demonstrates that cloaking is not intrinsically wrong or unethical. The technique can be used unethically, but it has various perfectly ethical uses.

How is cloaking done?
A simple way of doing it on an Apache server is by using the .htaccess file with the mod_rewrite module. With an .htaccess file in place, every file request is subject to it.

The .htaccess file has many uses but, for cloaking purposes, it employs Apache's mod_rewrite module to check for the search engine spiders' IP addresses, User-Agents, or both. If a spider is detected, then mod_rewrite is used to return a page that has been specially designed for spiders. If the requester is not a spider, then the request goes through as normal and the normal page is returned. Spiders are not aware of the switch. As far as they are concerned, they are getting the page that they requested.

Fantomas is widely recognized as the best cloaking software around. Information about it can be found here.

Stay tuned for our next installment, "auto-redirection"...

Copyright © 2025 Adnet Media. All Rights Reserved. XBIZ is a trademark of Adnet Media.
Reproduction in whole or in part in any form or medium without express written permission is prohibited.

More Articles

profile

Segpay Marks 20 Years of High-Risk Triumphs

Payment processors are behind-the-scenes players in the world of ecommerce, yet their role is critical. Ensuring secure, seamless transactions while navigating a rapidly changing regulatory landscape requires both technological expertise and business acumen.

Jackie Backman ·
opinion

The SCREEN Test: How to Prepare for Federal Age Verification

For those who are counting, there are now 20 enacted state laws in the United States requiring age verification for viewing online adult content, plus numerous proposed laws in the works. This ongoing barrage has been exhausting for many in the adult industry — and it may be about to escalate in the form of a potential new AV law, this time at the federal level.

Corey D. Silverstein ·
opinion

How to Master Team Dynamics for Business Success

Having the right team in place is everything. Whether getting a startup off the ground and thriving, or safeguarding an established company, the right — or wrong — people can mean the difference between a successful venture and a failed dream.

Juicy Jay ·
opinion

Eight Steps to Fast-Track AI Site Approval for Processing

Artificial intelligence is a hot topic these days. AI technology is speeding up the way we do business across all industries and offers numerous benefits, from automating processes to increasing efficiency and scalability.

Cathy Beardsley ·
opinion

How to Secure High-Risk Transactions With Network Tokenization

Ensuring the security of data as it moves through digital channels is the foundation of safe transactions, and crucial for your success. If your business can’t secure transactions, you’re exposed to myriad processing traumas.

Jonathan Corona ·
profile

WIA Profile: Reba Rocket

As chief operating officer and chief marketing officer of Takedown Piracy, long at the forefront of intellectual property protection in adult entertainment, Rocket is dedicated to safeguarding the livelihoods of content creators and producers while fostering a more ethical and sustainable industry.

Women In Adult ·
opinion

Protecting Content Ownership Rights When Using AI

In today’s digital age, content producers have more tools at their disposal than ever before. Among these tools, artificial intelligence (AI) content generation has emerged as a game changer, enabling creators to produce high-quality content quickly and efficiently.

Corey D. Silverstein ·
opinion

How Payment Orchestration Can Help Your Business

An emerging payment solution is making waves in the merchant world: the payment orchestration platform (POP). It’s quickly gaining traction as a powerful tool for managing online payments — but questions abound.

Cathy Beardsley ·
opinion

Fine-Tuning Refund and Cancellation Policies

For adult websites, managing refunds and cancellations isn’t just about customer service. It’s a crucial factor in maintaining compliance with the regulations of payment processors and payment networks such as Visa and Mastercard.

Jonathan Corona ·
profile

WIA Profile: Laurel Bencomo

Born in Cambridge, England but raised in Spain, Laurel Bencomo initially chose to study business at the University of Barcelona simply because it felt familiar — both of her parents are entrepreneurs. She went on to earn a master’s degree in sales and marketing management at the EADA Business School, while working in events for a group of restaurants in Barcelona.

Women In Adult ·
Show More