mirror of https://github.com/gorhill/uBlock.git
Updated About "Why uBlock Origin works so much better than Pi‑hole does?" (markdown)
parent
99ecb304aa
commit
ab6b3218ea
|
@ -1,29 +1,31 @@
|
|||
Off the top of my head:
|
||||
|
||||
- Cancels network requests early within the browser
|
||||
- Pattern-based filtering on the whole URL
|
||||
- example: `&act=ads_`
|
||||
- Pattern-based filtering on the whole URL. Examples:
|
||||
- Plain pattern: `&act=ads_`
|
||||
- Wildcard-based pattern: `/analytics.*/event?`
|
||||
- Regex-based pattern: `/^https?:\/\/[a-z]{8,15}\.[a-z]{2,3}\/5\/\d{6,7}(?:\?_=\d+)?$/$script,3p`
|
||||
- Context information
|
||||
- example: `$script,third-party,domain=imgbox.com`
|
||||
- point-and-click to enable/disable blocking behavior on a per-site basis:
|
||||
- Example: `$script,third-party,domain=imgbox.com`
|
||||
- Point-and-click to enable/disable blocking behavior on a per-site basis:
|
||||
- JavaScript
|
||||
- Large media elements
|
||||
- Remote fonts
|
||||
- Etc.
|
||||
- you can see what specific network requests are made by what specific page, you can fully inform yourself of what specific pages/sites are causing your browser to do
|
||||
- example: <https://twitter.com/gorhill/status/934474012377444352>
|
||||
- You can see what specific network requests are made by what specific page, you can fully inform yourself of what specific pages/sites are causing your browser to do
|
||||
- Example: <https://twitter.com/gorhill/status/934474012377444352>
|
||||
- Ability to redirect to a neutered version of a resource
|
||||
- example: `||google-analytics.com/ga.js$script,redirect=google-analytics.com/ga.js`
|
||||
- Example: `||google-analytics.com/ga.js$script,redirect=google-analytics.com/ga.js`
|
||||
- Cosmetic filtering, the manipulation of DOM elements in the browser
|
||||
- example: `##.AdHeader`
|
||||
- Example: `##.AdHeader`
|
||||
- Scriptlet injection filtering, the injection of JS scriptlets to modify the behavior of a page which is effective to defuse anti-content blockers
|
||||
- example: `wallstreet-online.de##+js(nostif, userHasAdblocker)`
|
||||
- Example: `wallstreet-online.de##+js(nostif, userHasAdblocker)`
|
||||
- HTML filtering (Tor Browser and Firefox only), the removal of DOM elements from a document before parsed by the browser
|
||||
- example: `wetteronline.de##^script:has-text(runCount)`
|
||||
- Example: `wetteronline.de##^script:has-text(runCount)`
|
||||
- Ability to deal with unwanted popups
|
||||
- example: `&link_type=offer$popup,third-party`
|
||||
- Example: `&link_type=offer$popup,third-party`
|
||||
- Ability to remove tracking parameters from websites
|
||||
- example: `||wuzhuiso.com^$removeparam=src`
|
||||
- Example: `||wuzhuiso.com^$removeparam=src`
|
||||
- You can easily (narrowly/broadly) override any filter from the filter lists through simple point-and-click operations to customize your filtering or to quickly fix sites broken as a result of overzealous filters
|
||||
|
||||
The main advantage of Pi-Hole is that it filters network traffic from all devices on your network, but filtering is blunt compared to what you can do through a browser extension.
|
Loading…
Reference in New Issue