-
Notifications
You must be signed in to change notification settings - Fork 664
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ublock / block list bypass #134
Comments
...and, conversely, if you care about privacy in the face of bad actors and want to ensure evercookie and related technologies are defeated on a technical level without giving yourself decision fatigue:
|
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
#114
Since the issue remains open but seemed to have died out years ago so I can't reply to the original issue; I'll throw in my method here.
All the 'easyprivacy' block script is doing blocking out the request for anything containing the path "/evercookie/". You can bypass block scripts by just changing the name to anything else. It is a very ez-pz thing to step around.
To fight against block script patterns that may occur after first method fails:
For best results just random cache the php file names with a list of random names.
For better results have the name list be around 1000+ random names / hashes and guid formats.
Then check if the request was handled or not. There are different ways this can be done.
If not re-generate with the next name in list and delete old cache. Repeat until true or error out page.
Most block script regex patterns can't even match against that kind of generation and is much better than hash / guid caching your file / directory names.
The text was updated successfully, but these errors were encountered: