Since their usage is probably forbidden my the TOS of the platforms they use, and the platforms will try to detect this kind of usage and ban users, I would assume that the closer they appear like natural usage, the more effective they are.
Running these apps on a emulator and using VPNs etc. will probably be a red flag.
Surprised they use real phones for this, I would think VMs and VPNs would be the most scalable.
Since their usage is probably forbidden my the TOS of the platforms they use, and the platforms will try to detect this kind of usage and ban users, I would assume that the closer they appear like natural usage, the more effective they are.
Running these apps on a emulator and using VPNs etc. will probably be a red flag.