- Feb 26, 2021
- 945
Can honestly say that I have never used advanced mode in uBO
You should try it. It's awesome! And it's a good way to learn.
Can honestly say that I have never used advanced mode in uBO
That depends. They are not the same. uBo is better at cosmetic filtering, most notably because it has an advanced mode where you can block server requests.
For creating cosmetic filters AdGuard's rule builder is a little more advanced than uBlockOrigin's element picker. AdGuard does not have the advanced mode of uBlockOrigin, but it has an extra stealth mode with 'self distructing cookies' option. Advanced mode has noting to do with cosmetic filtering, it ads an extra layer of managing (server) request as you posted.
A lot of tracking mechanisms moved from cookies to URL parameters, pixel tags, websocket and XMLHttpRequest/Fetch mechanisms. uBO's advanced medium mode allows Websocket, XMLHttpRequest and Fetches (it has like AdGuard advanced rules to deal with 1x1, 2x2 and 3x3 pixel tags, but I doubt many people know how to use them), so uBO's advanced medium mode "only" adds a layer of security at the cost of a lot of hassle and tweaking.
Using Edge with advanced (super duper) security mode which disables the Javascript Just in Time compiler and enabling Edge option to lower the renderer processes to AppContainer rights is a far more effective and hassle free security measure than tweaking uBO in advanced mode. Just look at @Andy Ful posts on malware samples and comparative testing, you can read that the usage of browser based javascript malware has lowered in the past decade (shifted to misuse of scripting in documents and lolbins).
That said I have advanced mode third-party blocking of uBO enabled in my Edge "strict" profile (disabled in my "easy" profile), not because it actually adds something to Edge security, but because it feels good to have control over what is allowed to connect. In this matter I agree with you: it feels safer to use uBO's advanced mode
For the average user AG is as good as uBO (and AGv4 is Google Manifest 3 compatible).
You’ve probably had this happen: you’re going to a party, everything seems perfect, and just before you leave you notice a stain on your clothes. What would you do? Change your look, of course. Well, we’ve noticed a little “stain” on the v4.0.133 release too: some users were unable to remove a domain from Allowlist after the update. And we’ve decided to release a new version right away with this bug fixed.
Changelog
- [Fixed] Pause button not fully aligned to center #1994
- [Fixed] User rules and allowlist box shrinks little to left #1995
- [Fixed] Rules with :where() pseudo class do not work #1998
- [Fixed] Cannot remove a domain from Allowlist after update to v4.0 #2002
- [Fixed] 'Learn more' button design on update popup
Its working fine here with adguard annoyances filter. (adguard extension).Can anyone help me with a filter to get rid of this notification on the bottom? I've been trying but nothing seems to be working. Thanks!
View attachment 265136
Its working fine here with adguard annoyances filter. (adguard extension).
I don't see it too. I also have the "Use optimized filters" option enabled.Really? I just added it (I was using the optimized list before) and I still see it.
Can anyone help me with a filter to get rid of this notification on the bottom? I've been trying but nothing seems to be working. Thanks!
View attachment 265136
@SeriousHoax @silversurfer @oldschool @Gandalf_The_Grey
I am thinking on getting YouTube Premium for the first time, and then ditch Adguard Desktop ( system wide) and only use AdGuard browser extension v4.0.
Any idea about my decision?
Many thanks!
I agree with what @silversurfer said.@SeriousHoax @silversurfer @oldschool @Gandalf_The_Grey
I am thinking on getting YouTube Premium for the first time, and then ditch Adguard Desktop ( system wide) and only use AdGuard browser extension v4.0.
Any idea about my decision?
Many thanks!
And I agree as wellI agree with what @silversurfer said.
Maybe this is a stupid question but why is HTTPS scanning to be avoided?Adguard for Windows HTTPS scanning is worth to avoid....
Maybe this is a stupid question but why is HTTPS scanning to be avoided?
Maybe this is a stupid question but why is HTTPS scanning to be avoided?
I can partially agree with this case of protection by AVs, although other AV modules are usually able to catch malware one step later: signatures, cloud detection, behavior blocker.@SecureKongo - Thank you
From my point of view after reading this article and a few other articles online I decided to keep the option ticked considering that the percentage of malware distribution via HTTPS traffic has increased over the last 2 years even though the risk of my traffic being compromised due to AV/Adguard certificates at some point, I'm sure won't be too soon.
HPKP checking is disabled for local certificates, that's why the test fails.
That's one of the reasons we do have a huge exceptions list. Whatever we do, it'd be better to not filter HTTPS on banking websites as HTTPS provides quite a few good enough options to protect itself.
What for our plans, we're currently working on a GitHub - AdguardTeam/CoreLibs: Core Adguard libraries, core Adguard libraries which will be shared between all AG products.
One of those core libraries would be an SSL verification library, supporting HPKP and CRLSets.