From e03d1b10d421de333784c6509c440d4c8361d893 Mon Sep 17 00:00:00 2001 From: Snapy Date: Wed, 18 Feb 2015 17:09:53 +0100 Subject: [PATCH] Use 3p request type introduced in recent versions --- µBlock-and-others:-Blocking-ads,-trackers,-malwares.md | 8 +++----- 1 file changed, 3 insertions(+), 5 deletions(-) diff --git a/µBlock-and-others:-Blocking-ads,-trackers,-malwares.md b/µBlock-and-others:-Blocking-ads,-trackers,-malwares.md index 3b40d8a..6a0e361 100644 --- a/µBlock-and-others:-Blocking-ads,-trackers,-malwares.md +++ b/µBlock-and-others:-Blocking-ads,-trackers,-malwares.md @@ -84,14 +84,12 @@ Using the data diffs, one can observe that with uBlock + default settings, there So if this concerns you (it should), I would say the best way to foil these is to use [dynamic filtering](https://github.com/gorhill/uBlock/wiki/Dynamic-filtering). Here are the rules, which will block all these 3rd-parties, except when used as 1st-party: - * facebook.com * block + * facebook.com 3p block * facebook.net * block * googletagservices.com * block * taboola.com * block - * twitter.com * block - facebook.com facebook.com * noop - facebook.com facebook.net * noop - twitter.com twitter.com * noop + * twitter.com 3p block + facebook.com facebook.net noop With these few dynamic filtering rules, you would lower the _"distinct 1st-party/3rd-party pairs"_ figure for µBlock to 318 (from 491). As a bonus, pages will load markedly faster.