diff --git a/µBlock-and-others:-Blocking-ads,-trackers,-malwares.md b/µBlock-and-others:-Blocking-ads,-trackers,-malwares.md index d3b6afb..62594ec 100644 --- a/µBlock-and-others:-Blocking-ads,-trackers,-malwares.md +++ b/µBlock-and-others:-Blocking-ads,-trackers,-malwares.md @@ -78,19 +78,20 @@ Using the data diffs, one can observe that there are large areas of privacy expo - `facebook.com` (44) - `googletagservices.com` (39) - `twitter.com` (34) -- `taboola.com` () +- `taboola.com` (11) So if this concerns you (it should), I would say the best way to foil these is to use [dynamic filtering](https://github.com/gorhill/uBlock/wiki/Dynamic-filtering). Here are the rules, which will block all these 3rd-parties, except when used as 1st-party: * facebook.com * block * facebook.net * block * googletagservices.com * block + * taboola.com * block * twitter.com * block facebook.com facebook.com * noop facebook.com facebook.net * noop twitter.com twitter.com * noop -With these few dynamic filtering rules, you would lower the _"distinct 1st-party/3rd-party pairs"_ figure for µBlock to 329 (from 491). As a bonus, pages will load markedly faster. +With these few dynamic filtering rules, you would lower the _"distinct 1st-party/3rd-party pairs"_ figure for µBlock to 318 (from 491). As a bonus, pages will load markedly faster. Any of the blocked domains above can easily be unblocked for a specific site. For example, if ever you want Twitter widgets to work when visiting AnandTech, just set `twitter.com` to a local _noop_ for that site, a mere point-and-click when using the dynamic filtering matrix.