-
Notifications
You must be signed in to change notification settings - Fork 2.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Change default (standard) network blocking policy to always allow 1p requests #17366
Change default (standard) network blocking policy to always allow 1p requests #17366
Comments
I think this needs to be included in the release notes. Its a significant change, and being made for good (if not without a downside too) reason |
I figured the flag itself wasn't significant enough without any changes in-browser yet, but that sounds good |
@pes10k this is problematic for now, because griffin parameters are only applied after restart. Many people never restart, so they would have a default value aka enabled. I reckon we have to ship it as disabled by default and enable via griffin when needed |
This flag is mostly here so that advanced tin foil users can disable, not for a staged rollout, so I’m not so concerned in this case
… On Aug 13, 2021, at 12:53, iefremov ***@***.***> wrote:
However, it should, day-0, be rolled out with 0% deployment (off for everyone) with Griffin
@pes10k this is problematic for now, because griffin parameters are only applied after restart. Many people never restart, so they would have a default value aka enabled. I reckon we have to ship it as disabled by default and enable via griffin when needed
—
You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub, or unsubscribe.
Triage notifications on the go with GitHub Mobile for iOS or Android.
|
@iefremov I've implemented it as default-on, where the "on" behavior matches the current pre-flag behavior - if I understand your concern correctly that should work too. |
ah, correct - we would keep the current behaviour until users update & relaunch to apply the seed. That sounds good, thanks for the clarification |
QA: this is |
Verified
Steps:
NOTE: because there are two overlapping tests on one page, the "No resources should be blocked in shields." from the test page is erroneous, as the bottom test blocks the image regardless of settings, which shows up in the 1st test's Shields info panel.
Verified
Steps:
NOTE: because there are two overlapping tests on one page, the "No resources should be blocked in shields." from the test page is erroneous, as the bottom test blocks the image regardless of settings, which shows up in the 1st test's Shields info panel.
Verification passed on
Steps:
|
Removing Android label as a follow up issue (#18274) is logged for Android |
To improve web compat (and so reduce how often users need to drop all shields, and so all protections) we should change the default blocking configuration in Brave. All sub-requests with the same eTLD+1 as the top level document (i.e., "first party requests") should be allowed when in "Trackers & Ads Blocked (Standard)" mode.
"Trackers & Ads Blocked (Aggressive)" mode should retain the current behavior.
This feature should be default on, ie when the flag is set to default, the above policy is active.
However, it should, day-0, be rolled out with 0% deployment (off for everyone) with Griffin
The text was updated successfully, but these errors were encountered: