- Apr 24, 2016
- 7,235
Thanks I also had to add xhr:Good thinking! Maybe addscript,subdocument
options to limit the allowed elements.
Code:
@@||choice.faktor.io^$script,xhr,subdocument,domain=omroepwest.nl
Thanks I also had to add xhr:Good thinking! Maybe addscript,subdocument
options to limit the allowed elements.
@@||choice.faktor.io^$script,xhr,subdocument,domain=omroepwest.nl
My update (using uBlockOrigin again because of new Top3000 filter )
Filterlists (only 1 filter list)
https://raw.githubusercontent.com/Kees1958/W3C_annual_most_used_survey_blocklist/master/Top3000
My Filter
! Block (obselete flash) plugins and (hyperling auditing & sending beacons) pings
||*$object,ping
! Block insecure third-party content except stylesheet, image and media
||HTTP://*$3p,~stylesheet,~image,~media
My rules
no-cosmetic-filtering: * true
* * 3p-frame block
* * 3p-script block
* com * noop
* io * noop
* net * noop
* nl * noop
* org * noop
* uk * noop
Sorry English is not my first language, I do not understand the phrase "a fresh go though to paranoid"I'll give your configuration a fresh go though to paranoid to use just one list lol
Sorry English is not my first language, I do not understand the phrase "a fresh go though to paranoid"
He's just saying that he's curious but afraid to try your config. Your config indeed looks interesting. Do you use another layer of filtering? How do you deal with 1st party stuff?Sorry English is not my first language, I do not understand the phrase "a fresh go though to paranoid"
Thanks for your explanationHe's just saying that he's curious but afraid to try your config. Your config indeed looks interesting. Do you use another layer of filtering? How do you deal with 1st party stuff?
Ah, I see. I also use NextDNS but strictly only activate its Security features.Thanks for your explanation
No other layer of filtering when I did the quicktest of Top300 versus uBO default (Update - Adblocking innovation).
Normally I use NextDNS on default (not using their installer, just adding the IP4 and IP6 servers mentioned on their website NextDNS) in my WIFI adapter properties in Windows10. An MT-member (forgot who) advised me to use NextDns to deal with first-party trackers. (NextDNS prevents first-party trackers using "dns delegation", "dns aliasing" and "cname cloaking").
a Tweet from Raymond Hill, creator of uBlock Origin
Another reason maybe to change your search engine from Google to....something else.
a Tweet from Raymond Hill, creator of uBlock Origin
Another reason maybe to change your search engine from Google to....something else.
Sometimes someone will report ads not being blocked by uBO in some search engine page. It is often found that another extension is injecting those ads.
No, it's another extension that injected those ads and the reason that uBlock Origin couldn't remove them.
I don't think so. It's more the power/permissions extensions have when installed in your browser.Right!
Do you (anyone) think Google Search facilitates or enables this to happen?
I think it has little to nothing to do with Google Search itself. Google Search is just happen to be the most used search engine so it's just a natural target for abuse. It's more about Chrome Web Store which has been continuously being abused by scummy extension developers. It's pretty ridiculous that Google keep allowing it to happen and has only done so little about it.Right!
Do you (anyone) think Google Search facilitates or enables this to happen?
'Adguard for Windows' or the browser extension?I just Adguard
~LDogg