mirror of https://github.com/gorhill/uBlock.git
Updated µBlock and others: Blocking ads, trackers, malwares (markdown)
parent
d5102dbfcd
commit
8f20fb2631
|
@ -70,6 +70,27 @@ This shows the differences in what was **not** blocked. If something appears on
|
|||
|
||||
These diffs may help you in deciding whether you should complement uBlock with another blocker, though keep in mind you can always ask µBlock to block more (dynamic filtering may come handy for this).
|
||||
|
||||
### Observations
|
||||
|
||||
Using the data diffs, one can observe that there are large privacy exposure related to:
|
||||
|
||||
- `facebook.com` (44)
|
||||
- `facebook.net` (45)
|
||||
- `googletagservices.com` (39)
|
||||
- `twitter.com` (34)
|
||||
|
||||
So if this concerns you (it should), I would say the best way to foil these is to use dynamic filtering. Here are the rules, which will block all these 3rd-parties, except when used as 1st-party:
|
||||
|
||||
* facebook.com * block
|
||||
* facebook.net * block
|
||||
* googletagservices.com * block
|
||||
* twitter.com * block
|
||||
facebook.com facebook.com * noop
|
||||
facebook.com facebook.net * noop
|
||||
twitter.com twitter.com * noop
|
||||
|
||||
With these few dynamic filtering rules, you would lower the _"distinct 1st-party/3rd-party pairs"_ figure for to 329, from 491. As a bonus, pages will loads markedly faster.
|
||||
|
||||
### Methodology
|
||||
|
||||
All blockers were configured in such a way as to compare apples-vs-apples:
|
||||
|
|
Loading…
Reference in New Issue