I don't use filterlists concerning malicious - and phishing sites. Osprey browser extension is much more effective.
I had this as well.Regarding Bypass Paywalls Clean filters, the "gitflic.ru" site where it is hosted now has added DDoS protection on their site. Visiting via browser is possible after the check is done but adblockers cannot directly update the filter anymore. The filter list also hasn't been updated in a week. Maybe the dev is trying to find alternate solution once again. From GitHub to GitLab to GitFlic. What's next?
Regarding Bypass Paywalls Clean filters, the "gitflic.ru" site where it is hosted now has added DDoS protection on their site. Visiting via browser is possible after the check is done but adblockers cannot directly update the filter anymore. [...]
Thanks for posting.Now I have to manually download, then upload the filter list to Dropbox and then import that URL in uBO...
No, keeping the gitflic.ru cookie when Firefox closed did not resolve the issue.And perhaps not deleting the gitflic.ru cookie when Firefox closes might be a way to resolve the issue.
gitflic has put 10 cookies here after the browser check; some of them very short-lived.No, keeping the gitflic.ru cookie when Firefox closed did not resolve the issue.
Next day, I still had to visit the BPC filters page at gitflic first, to enable uBlock Origin to check and update the filterlist.
The days before, and today, each time I visited the BPC filters page at gitflic the experience was a little different.I also had to disable uBO there for the check to proceed...
On Firefox.@nicolaasjan, did you use uBlock Origin on Firefox or on another browser?
GitFlic stopped using DDoS-Guard, so it seems.Regarding Bypass Paywalls Clean filters, the "gitflic.ru" site where it is hosted now has added DDoS protection on their site. Visiting via browser is possible after the check is done but adblockers cannot directly update the filter anymore. [...]
Il mio(utilizzando uBol per consentire solo i TLD e i codici paese comuni della zona UE estesa e dei paesi 5 Eyes da HTTPS).
View attachment 294226
Cloudflare Zero Trust DNS con OISD piccolo e Brave integrato su Aggressive svolgono il lavoro più pesante nel mio profilo di navigazione (semplice tema rosso).
Nel mio profilo di lavoro (tema celeste), gli scudi Brave sono disabilitati e l'anti-tracciamento è abilitato in Avira Browser Safety. L'OISD ridotto (nel DNS) e l'anti-tracciamento di Avira sono così conservativi che non hanno mai compromesso alcuna funzionalità del sito web (finora). Mi piace molto l'approccio a due profili: invece di cercare di bilanciare la compatibilità e bloccare le pubblicità fastidiose, ho un profilo per la compatibilità (con un filtraggio moderato/leggero) e uno per la soppressione delle pubblicità fastidiose (con un filtraggio aggressivo e una riduzione della superficie di attacco).
What a nice idea.Have you ever tried checking tracker blocking in particular?
I did a serious test over a year ago.
I removed only EP from uBo and checked whether DNS filtering alone (my usual filter list + AG tracking protection + EP) could block all trackers from websites known for their high tracker content.
I used Firefox with its built-in tracker blocking capability.
Firefox's developer tools are more specific than chromium-based browsers in highlighting the categories of blocked trackers.
I used Privacy Badger as a control extension.
The result was interesting.
I had to add 4 personal rules to uBo and AG.
They are almost certainly redundant today, but I haven't deleted them, I still use them now.
What a nice idea.
I recently removed Avira Browser Security (with anti-tracking enabled), because Cloudflare did a good job blocking phishing and malware websites and Avira tracking counter remained zero (subscribing the point your are making). In my work profile just Cloudflare with OISD-small seems to block as much as Avira's (AdGuard based) anti-tracking (only Avira is way more conservative using only the server sublists of AG looking at the memory usage of Avira extension).
I am a bit reluctant to add advertising and tracking blocklists in the DNS. I used ControlD plus OISD free in the past until something was blocked for work and I had to switch to Quad9 DNS. I switched to Cloudflare Zero Trust with OISD small, but have not ran into problems (while doing simular work last week), making me assume that OISD-small was the culpritt of the block and it has been corrected. The benefit of Cloudflare free plan versus ControlID free is that in can see what is blocked in the Zero Trust panel.
Would you PM the 4 rules you added?
Thanks
It seems that the AdGuard optimized lists are no longer optimized.
It seems that the AdGuard optimized lists are no longer optimized.
Have you checked the default EasyPrivacy in uBlock vs your EasyPrivacy optimized list?