Page 1 of 1

Food for Thought

Posted: 2019-04-16, 08:52
by billmcct
https://www.bleepingcomputer.com/news/s ... ious-code/
Kinda makes me want to check all my lists.

Re: Food for Thought

Posted: 2019-04-16, 11:06
by therube
If an "ad blocker" can do this, then the potential exists for any extension to do the same, by unintended coding or by malicious intent.

Google feels its an extension issue.
From the little I know about Chrome extensions, they're safe as can be ;-).

Mozilla certainly does nothing pertaining to vetting their extensions.


Oh, & lets not forget that Chrome has already started down the path of wanting to block (or at least greatly neuter) adblockers.

Re: Food for Thought

Posted: 2019-04-16, 12:46
by Nigaikaze
billmcct wrote:Kinda makes me want to check all my lists.
Or switch to uBlock Origin. According to other articles about this, uBO does not support the $rewrite feature that is being exploited here.

Re: Food for Thought

Posted: 2019-04-16, 12:54
by vannilla
What is the purpose of the rewriting rule?
Why was it created? What does it solve?
Has there been a change in advertising companies that made old and less dangerous filters useless?

Re: Food for Thought

Posted: 2019-04-16, 19:50
by therube
Support for the rewrite option was added to give filter list authors more control when dealing with pre-roll video ads.
https://adblockplus.org/blog/potential- ... ter-option
The $rewrite filter provides a way to remove tracking data from URLs. One example might be avoiding Google Accelerated Mobile Pages (AMP). "We could redirect people to the non-AMP page as AMP is only meant to advertise and track not to actually make the web better," suggested Adblock Plus developer Hubert Figuière last year.
https://www.theregister.co.uk/2019/04/1 ... plus_hole/
Has there been a change in advertising companies that made old and less dangerous filters useless?
JustOff points to uBlock Origin's thoughts, viewtopic.php?p=165161#p165161.