-
Notifications
You must be signed in to change notification settings - Fork 23
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
گفت و گو / Chit-Chat #1
Comments
درود بر شما. یکی دیگه از اهداف، همکاری کردن با بالادست(Upstream) هست که در صورت امکان یک سری فیلتر ها در بالادست ادغام بشه؛ مثلاً سایت های تبلیغاتی/ردیابی تو مایه های یکتانت یا کاپریلا که توی EasyList یا uBlock Filters یا EasyPrivacy یا uBlock Privacy نیستن رو پیشنهاد بکنم و اضافه بشن. یک موضوع مهم دیگه هم که شوربختانه توی هیچکدوم از اون لیست هایی که فرستادید رعایت نشده بود، فیلتر های مربوط به ردیابی(Tracking) بود. در حال حاضر لیست Adblock-Iran به طور کامل بازنویسی شده و فیلتری ازش نمونده که نیاز به لحاظ کردن داشته باشه. تنها مشکلی که وجود داره اینه که احساس میکنم اطلاع رسانی زیادی باید انجام بشه تا کاربران پارسی زبانِ uBlock Origin از وجود همچین لیستی آگاه بشن. چون مطمئنم خیلی کاربرای پارسی زبان uBlock Origin اصلاً نمیدونن که این افزونه لیست های Regional هم داره. |
@MasterKia Great to see PersianBlocker included in gorhill/uBlock@33b839f, but I'd like to ask to still track changes and updates to adblock-iran and include them in PersianBlocker when/if any new items are added (same with my maintained lists, e.g. additional-hosts/unwanted-iranian). Maybe eventually the adblock-iran would point to PersianBlocker, in order to avoid forks and duplicate entries between lists. |
In a perfect world that's what I planned to do going forward; since my initial goal was to unite all Persian filterlists.
Sure thing, but are there any other list dedicated to Persian websites other than Unwanted-Iranian as you said "list_s_"?
Anyhow, I'm open to all your suggestions/changes: ناسلامتی شما اسطوره من در زمینه مسدودسازی تبلیغات هستی؛ شاید 10 سال گذشته باشه اما با این حال من هیچوقت اسکریپت هوشمندانه و زیرکانه شما برای مسدود کردن تبلیغات بلاگفا/رزبلاگ رو یادم نمیره و نخواهد رفت ;-) |
همینطوری میبندم که تو چشم نباشه :-) |
مرسی بابت پاسخ extensive شما؛ و با کلیه موارد لحاظ شده بنده موافق هستم (به خصوص موارد مرتبط به Trackers و Duplicate/dead ها). دو تا مسئله دیگه هم هست که می خواستم اشاره کنم:
📦 CombinedIRFilterBlockList-DRS.txt P.S. I'm sorry if this list is a bit exhaustive, as I haven't had time to maintain it yet. However, if you could go through it I would deeply appreciate your effort 😄
با سپاس و احترام فراوان از کلیه زحمات شما! 😄 👍🏻 |
1- لیست شما رو ذخیره کردم، بررسی میکنم و امیدوارم فیلتر ها یا سایت های خوبی از توش در بیاد. 2- شوربختانه آنچنان با سینتکس HOSTS File ها و یا فیلترلیست های Pi-Hole آشنا نیستم اما اگه توضیحی بتونید بدید مایلم باهاشون آشنایی پیدا کنم.
یا آیا باید اول همه این آدرس ها یه "0.0.0.0" هم گذاشته بشه تا لیست توی ابزار های شما درست کار کنه؟ مثلاً فایل هاست StevenBlack اول همه آدرس هاش 0.0.0.0 هست |
در ارتباط با مورد 1 تشکر ویژه می کنم. در ارتباط با مورد دوم، به صورت کلی قاعده به این صورت هست: (پیشاپیش از طولانی شدن متن پیام بنده عذرخواهی میکنم، ظاهراً طبق همیشه بنده در ارائه اطلاعات زیادهگویی میکنم) 1. تفاوت Domain Blocking با URL Blocking:مقدمه: به طور کلی، درخواستهای HTTP هنگام ارسال نیاز به بهدست آوردن آدرس آیپی سرور مورد نظر را دارند؛ به عنوان مثال زمانی که دامنه زمانی که این درخواست HTTP توسط مرورگر ایجاد شده باشد (بهعنوان مثال توسط URL زیر)، این امکان وجود دارد که توسط افزونه uBlockOrigin اقدام کنیم به جلوگیری از ارتباط با دامنه و یا آدرس URL فراخوانی شده:
در صورتی که این درخواست از جایی بهجز مرورگر ایجاد شده باشد (بهعنوان مثال، اپلیکیشن موبایل، کنسول بازی، تلویزین هوشمند و...)، معمولاً امکان نصب افزونه uBlockOrigin و مشابه آن وجود ندارد -- در نتیجه، امکان بلاک نمودن دامنههای تبلیغاتی به این شکل نیز سلب میگردد. در چنین شرایطی، میتوان از DNS سروری به غیر از سرور ارائه شده توسط ISP و یا 8.8.8.8 و 4.2.2.4 رایج استفاده کرد. نرمافزار هایی مانند AdGuard Home، Pi-hole و DNScrypt-proxy ابن قابلیت را دارند که بهصورت local، از ارائه آیپی به درخواست دامنههای تبلیغاتی جلوگیری نمایند، و به اینصورت دامنههای Adware، Tracking، Malware و غیره، پیش از اینکه به افزونههای مرورگر برسند اگر بهصورت عامیانه بیان کنم، از بیخ بلاک شوند. این متد بلاک نمودن، معمولاً هم جامعتر هستند، و هم effective تر. بنده شخصاً هر دو متد را با هم استفاده میکنم، زیرا بهاینصورت efficient ترین مکانیزم بلاک نمودن دامنههای مزخرف را استفاده میکنم و ضمناً دستگاههایی که فاقد قابلیت استفاده از uBlockOrigin هستند نیز میتوانند از دسترسی به این نوع دامنهها جلوگیری نمایند. کمپانی هایی نظیر Cloudflare، بهغیر از ارائه سرور های DNS اصلی، آدرسهای فرعیای نیز ارائه میدهند که برخی از این دامنهها را بلاک نمودهاند (اما نه همه). بهعنوان مثال، این DNS دامنههای Malware و یا Adult را بلاک میکنند -- اما متأسفانه این کار را این کمپانی بر روی Adware و Tracking انجام نمی دهد: من پیشنهاد میکنم که نگاهی نیز به نرمافزار بسیار کاربردی Pi-hole بیندازید، زیرا با توجه به مهارتهای شما و علاقهمندی شما ممکن است برایتان جالب باشد: بهطور کلی، اگر میدانیم که دامنهای مانند 2. فرمت لیست دامنههادر ارتباط با اینکه چه فرمتی جهت بلاک نمودن دامنهها لازم است؛ این مورد بستگی به مکانیزم بلاک نمودن دامنهها دارد. نرمافزار هایی مانند Pi-hole و DNScrypt-proxy نیازی به اشاره علت اینکه پیشوند فایل hosts بر روی سیستمعامل، فایل خاصی میباشد که از آن پیش از ارتباط به DNS Server جهت دریافت آدرس آیپی سایت مورد نظر استفاده میشود و از این ترفند میتوان استفاده نمود تا بهجای نصب این دسته از نرمافزار ها، سیستمعامل مستقیماً آدرس آیپی مورد نظر را بازگردانی نماید. به عنوان مثال در این مورد:
با قرار گیری این خط در فایل hosts سیستمعامل باعث میگردد که فرامینی نظیر اکنون با استفاده از آدرس آیپی (در گذشته از آدرس حال برخی از لیستها بر روی GitHub نسخه شامل این پیشوند را (جهت راحتی کاربر) ارائه میدهند که بدون نیاز به تغییرات دیگر، میتوان مستقیماً از آن استفاده نمود تا دامنههای مورد نظر بلاک گردد. بنده به دو دلیل این کار را توصیه نمیکنم: ضمناً استفاده از فایل hosts ایراد دیگری دارد و آن این است که تنها دامنه اشاره شده بهصورت کامل بلاک میگردد، و هیچ ساب دامنهای از آن با این روش بلاک نمیگردد که قطعاً جهت بلاک نمودن بسیار از دامنههایی که مختص تبلیغات هستند، کار مناسبی نیست. 3. سطح بلاک نمودن توسط دامنهدر ارتباط با این مورد، دو نکته حائز اهمیت میباشد:
در نتیجه ارائه لیست برای این دسته از نرمافزار ها، لازم به ارائه سابدامنه نمیباشد و Top-level domain جهت بلاک نمودن تمامی ساب دامنههای مذکور کافی است. همانطور که در بالا ذکر شد، استفاده از فایل hosts سیستمعامل فاقد قابلیت مسدود سازی این دسته از سابدامنهها است.
با توجه به اینکه مسیر URL مورد نظر بههیچعنوان به سرور DNS ارسال نمیگردند (چون نیازی به اینکار هم نیست) در نتیجه سرور DNS نمیتواند بر بلاک نمودن تنها بخشی از آن دامنه تأثیر گذار باشد. به عبارت دیگر:
در این مثال، در کلیه روشهای بلاک دامنه، نمیتوان در نتیجه این روش زمانی مفید واقع میشود که قصد بلاک کل دامنه را داشته باشیم، و در نتیجه برای بلاک نمودن یک مسیر استفاده نمیشود -- در نتیجه، مواردی که شامل مسیر URL هستند در لیستهای بلاک دامنه قرار نمیگیرند. یک نکته جالب (Fun fact): ابزار های مرتبط به کرک و کیجن معمولاً لازم دارند که از دسترسی نرمافزار کرک شده به دامنهی سایت سازنده جلوگیری نمایند، تا از از کار افتادن برنامه جلوگیری شود. بهطوری که چنانچه از سیستمعامل ویندوز استفاده مینمایید، میتوانید فایل hosts خود را باز نمایید و به احتمال قوی چندین خط را مشاهده خواهید نمود که مرتبط به همین مسئله activation نرمافزارهای پولی میباشد.
در ارتباط با لیستهای maintain شده توسط بنده:
مجدداً بابت طولانی شدن متن پیام پوزش میطلبم، و امیدوارم که موارد بیان شده در این زمینه مفید واقع شده باشد. با سپاس فراوان از توجه وقت شما! |
پس با این تفاسیر امکان لحاظ کردن همچین فیلتر هایی برای Pi-Hole و دیگر نرم افزار های مشابه وجود نداره (مثلاً تبلیغات بلاگفا/رزبلاگ رو نمیتونیم مسدود کنیم):
نسخه اولیه لیست آماده شد: درباره فیلتر های برای هر سایت (Site-Specific) اندکی مردد هستم، چون Pi-Hole به دلیل مسدودسازی در سطح DNS، نمیتونه از فیلتر کردن بخشی از دامنه پشتیبانی بکنه، یعنی نمیشه
گمون میکنم AdGuard Public DNS و NextDNS دامنه های تبلیغاتی و ردیابی رو هم مسدود میکنن، البته اینکه سرعتشون به اندازه امثالِ Cloudflare باشه رو باید سنجید و بررسی کرد. |
This "
Other three may works only in Privoxy? I suppose AdGuard Home (Alternative for Pi-Hole) no implemented detect path filtering. Also I think that AdGuard DNS and NextDNS after configuration (AdGuard have services at beta stage, NextDNS on free acconut may still filter first 300'000 network requests per month and 300'001+ send without filtering) can block domains based on hosts lists. Not configurable versions maybe have documentation do they filter something. I was very interested at the paragraph about blocking IP addresses with the help of Pi-Hole, once it was impossible or I mistakenly asked MajkiIT if the regex mechanism distinguishes it instead use simple filtering. Optionally, the translator damaged the sentence and I should check the English description and then only in my native language. |
Welcome @krystian3w |
Thanks for the fast response, @krystian3w! Just for the sake of completeness, I'd like to point out a couple of things that @MasterKia asked about. 1. Site-specific/Cosmetic filteringSince the DNS blocking mechanism cannot facilitate modifying the content on the page, it cannot be used to remove or filter ads and other content on the page. However, this is not what it's designed to do so, so it's actually a good thing. This mechanism should only be used for the websites that are ad-centric, tracking-centric, etc as a whole, not to filter specific parts of the webpage (like what uBlock Origin is designed to do). Sadly, this means that DNS blocking is not by itself enough to say, remove Youtube, Spotify, Aparat, Blogfa ads, and if we try to do so, the whole website might get bricked. However, it's a perfectly fine method to block Pop up domains, Tracking (such as Webgozar) websites, and affiliate domains as well. Don't worry about the cosmetic/path-based blocking not being suitable for this usage, as I mentioned before when possible uBo and other alternatives cover this kind of blocking. 2. Path filteringThere are software like Privoxy, and maybe AdGuard Home to facilitate path blocking. There are however two downsides to using such mechanisms:
I set up Privoxy/Squid in addition to DNSCrypt-proxy and Unbound for personal use back in 2014 when HTTPS wasn't a common thing to see in all websites, and it worked wonderfully to filter ads in domains such as blogfa/persiangig/etc. Now that HTTPS is more commonplace (which I'm very grateful for it), the old mechanisms of filtering paths don't work anymore in software such as Privoxy. They have recently introduced an experimental HTTPS filtering capability, but since then I haven't set it up for my personal usage, since I preferred not to decrypt HTTPS content that is passing through the server. Sidenote: Personally, I am still using Privoxy/Squid due to some other reasons (related to the regional limitations, such as sanctions and censorship); but the main bulk of domain blocking is done at the DNS level, for me. 3. Wildcard/Regex blockingMost of the DNS blocker software, to my knowledge, doesn't support regex or wildcard blocking. Pi-hole is great because it can block regex entries, however, this might not be supported everywhere. AdGuard I think supports both, but I might be mistaken. Personally, I use another great project named DNScrypt-proxy, since only it has DNS filtering, it has other super useful features such as encrypted forwarding, cloaking, load balancing, anonymization, and some other features as well! Thank you for @krystian3w for providing more info on the regex blocking. It's extremely efficient and useful, and I'd like to suggest reading more about and learning Regular Expressions if you haven't yet used them in some capacity. What I personally do for additional-hosts lists is to provide a separate wildcard/regex list, in addition to the plain domains-only list. This way, supported software can pull in the list, apply conversions if required, and use them. Back when I set it up in 2015, Pi-hole wasn't mature enough to use as a general DNS server, and it was only available on Rasberry Pi, so I stuck to DNScrypt-proxy for the time being. You can read more about my setup, which I use to this day, here: https://github.com/DRSDavidSoft/additional-hosts#set-up--configuration Sidenote: In my opinion, DNS encryption by itself is a very important topic, especially with the regional blocks that we face, e.g. I find the behavior annoying that the ISPs can spoof the returned IP address of an unencrypted DNS request to whatever they want, so I strongly advocate for DNS encryption solutions, such as the recent DNS-over-HTTPS and DNS-over-TLS, or the DNSCrypt v2 protocol that I use, as mentioned above. This way, besides preventing the unwanted tracking of visited domains by the government, the correct IP address of the server is returned instead of the spoofed one, with the additional block of unwanted domains on top of that. Sorry for the long sidenote BTW 4. AdGuard Public DNS / NextDNSBoth of these services are great, and IMO fine for personal use. NextDNS specifically can be analogized to running Pi-hole in the cloud, meaning you can include what filter lists to include, and I believe it can be set up to use 1.1.1.1 as the upstream. There are other publicly available, ads blocking DNS servers out there as well, some of them running open-source software with public lists as well. Personally, I prefer running my own services for personal and/or commercial usage due to a couple of reasons (such as having more control). Whatever the usage may be (local or remote), it is super useful to provide such lists, so it can be incorporated into other blocking technologies as well. Especially, on mobile devices with the help of apps such as Blokada, AdAway, AdGuard, DNS66, and more. One of the aggregated Pi-hole lists out there (one of the best) is Oisd.nl, it collects all the best Pi-hole lists, merges and de-duplicates them into a single efficient one. At the time of writing, the maintainer hasn't included PersianBlocker in there, but I'm sure with a little time he will catch on and include it as well. Oisd.nl list can be used with NextDNS. Sidenote, again: I use a dozen of domain lists, that amount to a total of about ~1 million blocked domains. I've applied about ~2.4K whitelisted domains, and the result is being used for all devices in my home and workplace, my friend, family, and colleagues' devices, and also among all of the servers that I use, or maintain. 5. IP filteringTo the best of my knowledge, it is impossible to block outgoing connections to an IP address, unless a firewall is involved. However, software like Pi-hole and DNSCrypt-proxy has a neat feature where they can filter the response of a DNS query request if the returned IP address matches the one being blocked. This can have the same outcome of actually blocking the IP address itself, however, it's not the same. For example, if the IP address of a domain like Cool feature, but I haven't found a use case for it personally. I prefer actually blocking the IP address, both the incoming and outgoing traffic for increased security and privacy. One example is the bogus IP of Using Pi-hole, it's not possible to block the IP address, since it's referenced by the browsers directly, and not as the result of resolving a known DNS query. In these situations, I have blocked the entire I have seen people mistakenly add something like this to their HOSTS file (sometimes the pirated software does the same, too):
All of the entries above are invalid, and usually ignored by the operating system. The only allowed (and possible, really) syntax for the HOSTS file is just the domain name, and the IP we want for that domain to resolve to. This means that using the Just an interesting fact I have seen on people's machines, that I thought to share. |
One key question: You mentioned "mobile applications, game consoles, Smart TVs, etc". |
Considering a situation where the user is only using a web-browser where uBlockOrigin is installed, and the filter lists used by uBlockOrigin and Pi-Hole are the same one to one, then the answer is no. There might only be the issue of efficiency, since it's advised against loading huge amounts of domains into the uBlock Origin memory, as it's a waste of system RAM since the user is not going to visit each and every one of those domains. However, in many cases, the requests are not coming all from the browser, or a browser with uBlock Origin enabled (such as embedded/built-in ones uses by Skyper, Discord, etc)... and also, many programs and apps may include trackers, which can't be blocked using uBo. That's the primary reason I suggest using Pi-Hole in addition to uBlock Origin, for the sake of completeness.
Correct, but even though popular browsers such as Samsung Internet support content blockers such as AdGuard, many like Google Chrome (and some other browsers on iOS) don't support either content blockers nor browser extensions. If the browser of choice supports extensions, then uBlock Origin would suffice the same as using it on desktop, but on other cases, DNS blocking is what usually required
I'd like to strongly suggest visiting filters like EnergizedProtection, 1Hosts, and projects such as AdAway, AdGuard Android, DNS66, and Blokada if you're on android. Many of them are open-source, and available on F-Droid repository. Many mobile games contain useless video ads, text ads, and many trackers, and even Xiaomi devices have the audacity to display ads within the system installer! 🤯 If you can use a Pi-hole or NextDNS solution, you don't need to run these android apps. As I said, all of my traffic goes through my encrypted and ad-blocked DNS traffic, so I only need to include the Pi-hole lists. If you're somehow doubtful, I'd like to invite you to run the Fiddler tool on your machine, setting it up so your Android traffic goes through it, and just have a look when you open general apps like Reddit, Twitter, some games, etc. I guarantee you it'll blow your mind, how much tracking and ad junk traffic is generated, sometimes by the manufacturer and pre-installed apps themselves. It's even better if you could root your device and install custom ROMs that don't include this junk traffic, but for most people using a DNS blocker would suffice. Don't disconnect your internet, combat the ads! 🙏🏻
Yes, but it's not limited just to web browsing. The ads are fetched from the TV manufacturer and shown on the user interface, in addition to the web browser. If you visit the /assholedesign on reddit and sort for the top of all time, you'll see results like these:
I have the same Samsung Smart TV as mentioned in the second link above. These are the lists I include to combat ads:
|
Good thing I blocked Edit:
Should I include |
So far in my tests, current major ISPs (HamraheAval and Irancell) support unencrypted custom DNS. I tried DoH encrypted custom DNS on Windows 11 using Irancell but it didn't work, I don't know why. |
I've been using NetGuard in the last months; all apps are blocked from connecting to the internet, except apps that I whitelist and domains that I allow those apps to connect to. |
In my tests and from past experience, all of the 10.10.34.0-255 range was only assigned for the bogus censorship servers. I haven't found any case where it was used for anything else than this. Note: the
I personally refrain from using the DNS servers provided by the ISP itself, as they can see the individual requests being made, which implies reduced privacy and a security risk. If they have blocked access to the encrypted DNS servers, it seems a good time to invest in setting up your personal network for increased security, privacy, and reduced ads, trackers and malware in general.
Sure, that's one of the reasons that I suggest using DNScrypt-proxy. It includes its own encrypted protocol for transmitting DNS packets, is fast and reliable.
Equally a good idea to use! I'm really happy to see that you've adopted the PersianPihole format as well, as it can be used in all of the places discussed above -- on servers, routers, as hosts file or directly in the mobile phone. I'd like to ask you to monitor your mobile traffic as well, and add any domains that need to be blocked in your lists, in order to increase the number of domains that it covers. Cheers! 😄 👍🏻 |
Sorry for my delayed response on that part, but I just came to say that it seems that the filtering game has become deeper and a lot of Telegram proxies are getting slaughtered unfortunately. |
@MasterKia No problems at all, I'd still like to discuss more about this, if you are interested. I'm available on Discord and Telegram, if either one works for you. You can also contact me via email for a preliminary proxy setup, as to use Telegram for continued discussions. |
In a few weeks, I'll be in touch. |
Also in a few weeks I'll make the PersianPiHole list on par with PersianBlocker (by bringing entries from your unwanted-iranian list). BTW, Do all major DNS blocking tools, treat "#" as comment (e.g. "# Trackers")? |
@MasterKia Mostly yes, I haven't seen one where the |
List with regex no like comments or need cleaing in Python on import. |
AdguardTeam/FiltersRegistry@4697b75 PersianBlocker has been added to AdGuard, they decided to call it "Persian Blocker" though :P I'm glad it got the "high" trust level, since PersianBlocker depends on scriptlets ( |
@krystian3w You were the most active community contributors here? |
هر وقت تاییدش کردن و به لیست سایت ها افزوده شد من هم اضافه اش خواهم کرد. |
@krystian3w Can you explain what's the deal with Why uBO doesn't stick to what it has been using? Do I need to test all the old rules in my list that have |
I can try but I can't guarantee that things will lighten up. I may not be able to read the differences in the questions (even in my language). You open this "spoiler" at your own risk.
Maybe it doesn't want to hold its own due to the fact that infinite nesting (where we have not taken the time to optimise) are unmanageable as long as the browser doesn't do validation of things in brackets. I have not tested this by taking measurements with devtools and e.g. https://github.com/AdguardTeam/ExtendedCss#debugging-extended-selectors. Ostensibly, the genesis of these "selectors" is that the browser API was once intended to replace JavaScript. Maybe due possible benefit be speed compared to the JavaScript version if we exclude lag from MV3 and we don't have super fast JS like AdGuard addon (I'm curious as to whether dropping the sizzle in AdGuard will make it slower). this question confuses me with question no. two.... I would force procedural has everywhere you see the browser version failing - for example:
For peace of mind, you can check all the ones you have created (Unless there are more than 2,000 of them.... 😋). One could be suggested by the answer to head question no. 3 (fourth if we count request for assistance). |
@krystian3w Thanks, I can see things more clearly now. |
در مورود Manifest V3 ممکنه یکم بیشتر توضیح بدین |
https://chrome.google.com/webstore/detail/ubo-minus-mv3/ddkjiahejlhfcafbddmgiahcphecmpfh Renamed is in releases. |
درود بر شما.
بله، دارن سازگار با Manifest V3 بازنویسی میشن. این حرکت رو سافاری هم چند سال پیش زده بود و برای همین دیگه یوبلاک روی سافاری کار نمیکنه چون به شدت فضاش محدود شد اما ادگارد یه نسخه براش ارائه داد.
نمیدونم چرا از فایرفاکس استفاده نمیکنید، چون تنها مرورگر آزادیه که برپایه کرومیوم (از گوگل) نیست و قرار هم نیست افزونه ها رو با MV3 اذیت کنه و بنابراین یوبلاک و ادگارد به درستی توی فایرفاکس به کار خودشون ادامه خواهند داد.
اگه اون فیلتر ها مربوط به لیست PersianBlocker هست اینجا گزارش بدید، تلاش میکنم فیلتر جایگزین بهتون بدم.
بله اما انگار محدود بودنش به اندازه سافاری نیست. |
You can use the PersianBlocker list: It's already the default in uBlock Origin and AdGuard. Also PersianBlockerHosts for DNS blockers: |
https://chrome.google.com/webstore/detail/ublock-origin-lite/ddkjiahejlhfcafbddmgiahcphecmpfh New named now in Chrome Web store. |
That logo though ...
Sad. |
ممنون از توضیحاتتون، فیلترهارو یه زمان دیگه براتون ارسال میکنم همینجا یا تو یه پست جدا در مورد مرورگر همه واقعا دیوار اکوسیستم اپل جوریه که مجبورت میکنه فقط از نرم افزارهای خودش استفاده کنی، خیلی از قابلیت هاش هست که جاش نیست اینجا بگم ولی در کل خیلی خوب دستگاه هاش با نرم افزاراش sync میشن باعث میشه از نرم افزارهای غیر خودش صرف نظر کنی. |
Thanks. |
Edge Added support? PS. Maybe gorhill found hack to correct block newtwork form hosts files in one rule (or incorrect works translator syntax). |
Yes, uBlockOrigin/uBlock-issues#338 (comment):
|
Didn't know uBO uses the "NoCoin" list. |
/bake[a-z0-9-]{3,4}\.com/$foo,bar ? |
For cosmetic filtering needed follow: uBlockOrigin/uBlock-issues#2234 or test dangerous: com##.foo.bar or more dangerous (if TLD are unstable): *##.foo.bar and if page use *##.foo.bar:style(display: none !important;) Lastest uBo dev (1.44.5b14) don't simplify |
@peyman974 به تنظیمات uBlock Origin بخش My filters برید و اینا رو اونجا اضافه کنید: mobile.ir##.b
mobile.ir##.apnl
mobile.ir###bottombanner بعدش به سایت |
با درود @MHKarami97.
مطلبی که درباره لیست PersianBlocker نوشته بودید رو دیدم، توی مطلب لینک PersianBlockerHosts رو گذاشته بودید به جای PersianBlocker اصلی. اون لیست Hosts خیلی محدودتره و فقط به درد نرمافزار هایی مانند Pi-Hole و... میخوره. خواستم بگم که اگه دوست داشتید لینکش رو جایگزین کنید:
|
In addition, probably Pi-Hole entries are equal to those of ABP/EasyList syntax, that is, uBo will reject them as duplicates. |
AnyBody Can Help ? |
Try: vocalley.com##.container:style(font-size: 0px !important;)
vocalley.com##.container > center:others() |
سلام خوبی داداش |
درود بر شما، زنده باشید. |
عرض قدردانی
با توجه به پراکندگیهای موجود (و عدم maintanance نمودن لیستهای اقدامی پارسی در گذشته) متأسفانه امکان لحاظ کردن لیستهای زیر به طور مستقیم در uBlockOrigin برای هر شخص آسان نبود:
در صورتی که به زحمت بسیار مفید maintain کردن لیست PersianBlocker ادامه دهید (و با توجه به include شدن در فهرست official افزونه uBlockOrigin( پس از نصب این افزونه، بهراحتی با چند کلیک میتوان این لیست را فعال نمود و بلافاصله از مزایای آن برخوردار شد.
با توجه به این مسئله، از زحمات شما قدردانی میکنم 👍🏻
The text was updated successfully, but these errors were encountered: