zlacker

The FBI now recommends using an ad blocker when searching the web

submitted by taubek+(OP) on 2023-02-23 20:47:03 | 734 points 430 comments
[view article] [source] [go to bottom]

NOTE: showing posts with links only show all posts
◧◩
4. bogwog+G3[view] [source] [discussion] 2023-02-23 21:06:55
>>westco+j2
I use adnauseam (https://adnauseam.io/), which is built on top of ublock origin, and it works pretty well.

The generic nuclear option to hide terrible web design, bypass (some) paywalls, and improve performance 1000x is to disable javascript. ublock and adnauseam both have a button to disable all javascript on a page, which is handy when reading articles on sites filled with garbage.

◧◩
6. jjkmk+L3[view] [source] [discussion] 2023-02-23 21:07:20
>>westco+j2
UBlock Orgin works for most browsers, and has been the industry standard for some time. You can even deploy it as part of group policy in an organization: https://deployhappiness.com/deploying-ublock-origin-for-chro...
◧◩
10. anonym+B5[view] [source] [discussion] 2023-02-23 21:17:58
>>westco+j2
Pi-hole (https://pi-hole.net/) is a great ad blocker that requires no changes to your clients.
◧◩
11. jmclnx+I5[view] [source] [discussion] 2023-02-23 21:18:28
>>westco+j2
I use noscript

https://noscript.net/

But I sort of think this may be more of an issue with Cell Phones.

◧◩
14. markx2+k6[view] [source] [discussion] 2023-02-23 21:21:26
>>westco+j2
https://nextdns.io and then UBlock Origin, uMatrix, Noscript at least.
◧◩◪
27. Sparky+z8[view] [source] [discussion] 2023-02-23 21:31:17
>>markx2+k6
NextDNS + Ublock Origin (or Brave Browser, since it uses the UBO lists by default) is a really good combo on its own, and easy enough for my self-proclaimed "tech illiterate" friends to set up and use.

Also, it's pretty cool that NextDNS has this: https://github.com/nextdns/nextdns/wiki

◧◩
35. Scound+La[view] [source] [discussion] 2023-02-23 21:40:50
>>westco+j2
On iOS (but also for mac and tvOS), I took my pick of dns based systems here:

https://encrypted-dns.party/

https://gitlab.com/nitrohorse/ios14-encrypted-dns-mobileconf...

No idea if I should really trust them, or if there’s a better way to install profiles directly from CIRA or Mullvad like I use.

Nice thing is that it’s device wide and all free (hopefully not for malicious intents).

47. tech23+Sd[view] [source] 2023-02-23 21:54:52
>>taubek+(OP)
Official announcement, December 2022: https://www.ic3.gov/Media/Y2022/PSA221221
◧◩
54. SahAss+vg[view] [source] [discussion] 2023-02-23 22:06:09
>>Tactic+ra
The last one is very anglo-centric (or at least centric to fully latinized languages). Do you not find the rules[0] in for example chrome working?

[0]: https://chromium.googlesource.com/chromium/src/+/main/docs/i...

◧◩
55. eurtic+xg[view] [source] [discussion] 2023-02-23 22:06:12
>>Tactic+ra
Steven Black runs a hosts file on GitHub with regular updates. https://github.com/StevenBlack/hosts

There are a bunch of file variants to weed out specific bad actors.

It's well currated though I will disclaimer it has broken a few websites in the past for me. Maybe that's a good thing.

◧◩
66. lemonc+Gm[view] [source] [discussion] 2023-02-23 22:34:20
>>westco+j2
A combination of uBlock Origin + NoScript + Bypass Paywalls Clean + FastForward + ClearURLs as well as a pop-up blocker of your choice, will make your web browsing experience a bit cleaner. Not all of these might available for Chromium, I personally use Firefox for my daily use, with some Chromium browsers as backup.

NoScript will break pretty much 50% of the web. It'll take you about a day to whitelist all the sites you use daily and then it's smooth sailing.

I would also highly recommend this privacy focused list. https://www.privacytools.io/

◧◩
69. wlesie+An[view] [source] [discussion] 2023-02-23 22:38:31
>>VFIT7C+1b
There's been a series of malware distribution ads pretending to be blender.org popping up at the top of Google results on and off for months.

1 month ago: https://www.reddit.com/r/blender/comments/109yjxm/dont_click...

2 months ago: https://www.reddit.com/r/blender/comments/zewem3/beware_of_p...

4 months ago: https://www.reddit.com/r/blender/comments/xxkx5s/warning_som...

7 months ago: https://www.reddit.com/r/blender/comments/vuqu1r/hey_so_what...

Pretty sad state of affairs that Google can't or won't stop this, especially since they gradually redesigned the ads spots to look practically identical to the search results. Be very careful clicking anything on Google's search results.

◧◩◪
83. kmlx+fr[view] [source] [discussion] 2023-02-23 22:55:47
>>dcdc12+gp
i’ve used this one for years:

https://apps.apple.com/gb/app/wipr/id1030595027

no issues, works great.

◧◩
97. happyb+tu[view] [source] [discussion] 2023-02-23 23:11:14
>>madars+on
I develop a popular iOS and macOS ad blocker that block almost all ads[1] including all YouTube ads.

Will be interested to hear if you've tried it out and what may have been missing?

The only things we don't block at the moment is some non-English content and Adult sites. With a small team these haven't been the primary focus for the time being. Other than those though we should stop pretty much everything else.

[1] https://www.magiclasso.co/

◧◩◪
106. whydoy+vw[view] [source] [discussion] 2023-02-23 23:23:16
>>eurtic+xg
I use https://oisd.nl/ which has reasonably curated list on my router with unbound. Works pretty good.
◧◩◪◨
112. radica+9y[view] [source] [discussion] 2023-02-23 23:32:19
>>gigate+Uw
Try Wipr (https://giorgiocalderolla.com/wipr.html)
◧◩
116. arm+6z[view] [source] [discussion] 2023-02-23 23:37:33
>>madars+on
I haven’t used the iOS version of Orion myself (only the macOS version), but uBlock Origin + Orion would be the equivalent for iOS:

https://browser.kagi.com/faq.html#iosext

https://browser.kagi.com/

◧◩◪◨
140. scubbo+hE[view] [source] [discussion] 2023-02-24 00:07:42
>>akoumi+OC
> use a self hosted vpn that plugs into pihole? never tried it

Not that it plugs _into_ PiHole per se, but rather that the Self Hosted VPN makes your phone use your home DNS server (including the PiHole itself). It works! I use https://www.pivpn.io/ but there are many others.

◧◩
154. freedi+uG[view] [source] [discussion] 2023-02-24 00:22:33
>>kerkes+q9
You are correct ads have become popups of late 90s. Yet, very few browsers do, as most of them depend directly or indirectly on ad revenue.

AFAIK only Orion browser [1] comes with full 1st party and 3rd party ad and tracker blocking, by default.

[1] https://browser.kagi.com

◧◩
156. dredmo+gH[view] [source] [discussion] 2023-02-24 00:28:06
>>1vuio0+Os
Generally HN doesn't require a year for articles less than 6 months old or so.

Though yes, this story dates from December and was covered at the time (from a different source):

<https://news.ycombinator.com/item?id=34095107>

◧◩
158. dredmo+NH[view] [source] [discussion] 2023-02-24 00:30:44
>>tech23+Sd
Thanks for that.

There was also an HN discussion at the time: <https://news.ycombinator.com/item?id=34095107>

160. dredmo+RH[view] [source] 2023-02-24 00:31:23
>>taubek+(OP)
Discussed on HN at the time (2 months ago), via TechCrunch: <https://news.ycombinator.com/item?id=34095107> (36 comments).
◧◩
172. corysa+WK[view] [source] [discussion] 2023-02-24 00:53:26
>>madars+on
Get Firefox Focus for iOS. Set it as the ad blocker for Safari. Works pretty well. No proxy involved. Extra-tricky ads still get through.

https://support.mozilla.org/en-US/kb/firefox-focus-ios

◧◩◪
189. moreme+qP[view] [source] [discussion] 2023-02-24 01:24:53
>>userbi+tK
Also known as a transparent proxy, inline proxy, intercepting proxy and forced proxy.

https://cloudinfrastructureservices.co.uk/how-to-block-websi...

◧◩◪
196. BLKNSL+PQ[view] [source] [discussion] 2023-02-24 01:33:37
>>sircas+SD
Google and Meta seem to have no idea what's going on within their own advertising networks.

Similarly to all the stories (with two currently in the front page of HN, eBay and PayPal) about algorithms that are just insufficient for the range of realistic scenarios these companies must deal with on a regular basis.

It's merely the equation of profit outweighing customer service. Admittedly, they're working on a scale that's difficult to comprehend, but that shouldn't absolve them of aiding and abetting criminal use of their systems.

Google's and Meta's profit motives are the base cause of this continuing escalation of the ubiquity and user-hostility (to put it mildly) of internet advertising.

It's only been predictable for the last 20 years...

https://youtu.be/YlGklt4BSQ8 (first aired in March 2000)

https://youtu.be/XPGgTy5YJ-g (April 1999)

◧◩
197. warded+0R[view] [source] [discussion] 2023-02-24 01:34:08
>>westco+j2
to add one that hasn't been mentioned in this thread, a good hostfile can both block ads and speed up your internet. https://github.com/StevenBlack/hosts
◧◩
206. kfoley+GS[view] [source] [discussion] 2023-02-24 01:46:55
>>emacdo+hQ
> Is there a browser that has that feature yet? I spent a few hours trying to figure out if Firefox did. It did not appear to.

I believe this will be supported by manifest v3 extensions in Firefox[1] which is one of the features I'm looking forward to for the same reason.

[1]: https://blog.mozilla.org/addons/2022/10/31/begin-your-mv3-mi...

◧◩◪
232. autoex+e21[view] [source] [discussion] 2023-02-24 03:01:30
>>hsbaua+yL
Some older articles:

https://www.pcworld.com/article/435020/hackers-make-driveby-...

https://money.cnn.com/2013/02/22/technology/security/nbc-com...

https://blog.fox-it.com/2014/01/03/malicious-advertisements-...

https://www.cbsnews.com/news/huffpo-readers-hit-with-ransomw...

◧◩◪
242. LegitS+061[view] [source] [discussion] 2023-02-24 03:36:51
>>Terret+jL
https://news.ycombinator.com/item?id=34918382

magiclasso isn't free

◧◩◪◨
246. agiaca+a71[view] [source] [discussion] 2023-02-24 03:49:25
>>Samuel+sK
As others have said, .mobileconfig or official app work great.

I geek out a bit and use Surge for iOS (pricey and not for non-techie users) and run a few proxies. It'll also allow for DNS override, which I use NextDNS's DNS over HTTPS.

https://www.nssurge.com/

253. dngray+9a1[view] [source] 2023-02-24 04:19:37
>>taubek+(OP)
> Disconnect, Privacy Badger, ClearURLs

https://github.com/arkenfox/user.js/wiki/4.1-Extensions#-don...

Really these days about the only privacy extension you might need is uBO and possibly CanvasBlocker if you haven't set RFP.

https://support.mozilla.org/en-US/kb/firefox-protection-agai...

◧◩◪
256. dngray+Ja1[view] [source] [discussion] 2023-02-24 04:26:59
>>lemonc+Gm
The correct site is https://privacyguides.org

The former team left Privacy Tools and that is now just arbitrary recommendations by one guy who mostly spruiks cryptocurrency bullshit. He also has no experience when it comes to auditing, verifying any of what is recommended, not a sysop, not a programmer either.

If you want to know specifics about that see https://www.privacyguides.org/about/privacytools

Also see https://github.com/arkenfox/user.js/wiki/4.1-Extensions

260. dngray+2c1[view] [source] 2023-02-24 04:37:26
>>taubek+(OP)
One of the most important things you can do is enable ETP, (Enhanced Tracking Protection), set that to "Strict" and enable sanitizing on close:

We have instructions for that

https://www.privacyguides.org/desktop-browsers/#firefox

◧◩
261. dngray+If1[view] [source] [discussion] 2023-02-24 05:12:05
>>emacdo+hQ
> Consent-O-Matic (auto fill cookie consent forms)

This will modify the browser fringerprint making you more unique.

I would not install so many extensions as you're trusting a huge number of organizations/people with privileged access to your browser. Anything that modifies CSS, Document Object Model (DOM) will make your browser stand out.

We wrote a blog post about this: https://blog.privacyguides.org/2021/12/01/firefox-privacy-20...

That includes any extensions that modify what is requested etc. See:

https://github.com/arkenfox/user.js/wiki/4.1-Extensions

See https://www.privacyguides.org/desktop-browsers/#firefox, you really don't need to do anything more than that.

> Facebook Container

etc, not needed unless you login to multiple Facebook accounts.

> Disconnect

Not needed, you should enable Firefox's ETP Enhanced Tracking Protection, this includes anything on that list. https://support.mozilla.org/en-US/kb/enhanced-tracking-prote...

◧◩◪◨
263. dngray+ch1[view] [source] [discussion] 2023-02-24 05:23:31
>>mmsc+cI
> DoH uses UDP, not TCP. Unless you're using HTTP3/QUIC, you can block port 443/UDP.

There's actually two protocols DNS over QUIC https://datatracker.ietf.org/doc/rfc9250/ which has a specific port 853. This can be blocked.

Then there is DNS over HTTP3 https://security.googleblog.com/2022/07/dns-over-http3-in-an...

◧◩◪◨
264. dngray+Bh1[view] [source] [discussion] 2023-02-24 05:27:20
>>JohnFe+UE
> killing DoH conclusively on your home network is more difficult than you've made it seem

It's actually not too difficult if your users use Firefox. You can use enterprise policies https://support.mozilla.org/en-US/products/firefox-enterpris...

   /* 0710: disable DNS-over-HTTPS (DoH) rollout [FF60+]
    * 0=off by default, 2=TRR (Trusted Recursive Resolver) first, 3=TRR only, 5=explicitly off
    * see "doh-rollout.home-region": USA 2019, Canada 2021, Russia/Ukraine 2022 [3]
    * [1] https://hacks.mozilla.org/2018/05/a-cartoon-intro-to-dns-over-https/
    * [2] https://wiki.mozilla.org/Security/DOH-resolver-policy
    * [3] https://support.mozilla.org/en-US/kb/firefox-dns-over-https
    * [4] https://www.eff.org/deeplinks/2020/12/dns-doh-and-odoh-oh-my-year-review-2020 ***/
      // user_pref("network.trr.mode", 5);


It can be more of an issue if you have a lot of "smart" products or IoT products that essentially operate as black boxes on your network though. Would just recommend not doing that, if you have devices on your network that you don't control, someone else does.
◧◩◪
265. dngray+Ih1[view] [source] [discussion] 2023-02-24 05:28:21
>>maxeri+0S
You're on the right track, perhaps take a look at https://www.privacyguides.org/desktop-browsers/#firefox that's really all.
◧◩
269. dngray+Jk1[view] [source] [discussion] 2023-02-24 05:57:46
>>madars+on
Just be mindful that Firefox/Android doesn't have process isolation. https://www.privacyguides.org/mobile-browsers/#android

This is because the desktop browser uses the full "Gecko" renderer, but mobile uses "GeckoView", that doesn't have that implemented yet.

◧◩◪◨⬒
272. ddeck+Hm1[view] [source] [discussion] 2023-02-24 06:21:57
>>int_19+3G
The numbers agree. Only 69 Cyrillic domains (second-level) registered last year.

Chinese is the most popular, but only 760 for 2022 and the aggregate trend is down:

2016: 2378

2018: 2252

2020: 1675

2022: 1518

Internationalized Domain Name (IDN) Annual Report 2022

[1] https://www.icann.org/en/system/files/files/idn-annual-repor...

◧◩
275. Nemo_b+wp1[view] [source] [discussion] 2023-02-24 06:52:05
>>ravens+801
I don't, but Google is presumably not pleased to hear the FBI say "Cyber criminals purchase advertisements that appear within internet search results". https://www.ic3.gov/Media/Y2022/PSA221221

The FTC, other regulators or courts in the countless cases against Google may also use such a statement as validation that fraud is rampant.

◧◩◪◨⬒
277. sbuk+Ir1[view] [source] [discussion] 2023-02-24 07:11:08
>>rrrrrr+VC
https://1blocker.com/ Is a system wide ad blocker. It’s not uBlock Origin in terms of coverage, but extremely close and it work on all apps.
◧◩
283. emsixt+9v1[view] [source] [discussion] 2023-02-24 07:42:06
>>emacdo+hQ
I currently use an add-on to block search engine results (Highlight or Hide Search Engine Results[1]) so Kagi sounded interesting, but the free tier having a limit of 50 searches puts it out of the realm of even giving it a trial period for me.

I really like the idea about a sort of global blacklist for your permissions.

[1] https://github.com/pistom/hohser

◧◩
295. winbat+9B1[view] [source] [discussion] 2023-02-24 08:43:38
>>madars+on
Most blockers are running through Safari Extensions, so they’re limited to whatever Apple allows them to do. It’s no uBlock, but I made an app that lets you run your whole device’s traffic through a blocker [0].

[0]https://apps.apple.com/us/app/tulabyte/id1566083358

◧◩◪
296. justso+bB1[view] [source] [discussion] 2023-02-24 08:43:49
>>emacdo+4V
> The other has no plugins; I use it to visit my bank's website.

I use a separate portable FF[0] for that. That makes "cross contamination" impossible.

[0] https://portableapps.com/apps/internet/firefox_portable

◧◩◪◨⬒
303. always+aD1[view] [source] [discussion] 2023-02-24 09:00:55
>>bdlowe+Z71
Imagine not being able to have root, uBlock origin, or third party Youtube clients. Oh, and now also, sending every one of your pictures to Apple so they can call the cops on you to cover their asses[1].

1.https://sneak.berlin/20230115/macos-scans-your-local-files-n...

◧◩◪
305. always+rD1[view] [source] [discussion] 2023-02-24 09:03:17
>>stjohn+1B
Apple snoops on your pictures. [1]

https://sneak.berlin/20230115/macos-scans-your-local-files-n...

325. exodus+NO1[view] [source] 2023-02-24 10:58:10
>>taubek+(OP)
The FBI page in question[0] (I hope ic3.gov is legit!) says "Before clicking on an advertisement, check the URL to make sure the site is authentic." But on a mobile device nobody knows how to do that. And the URL will be some kind of ad redirect a mile long.

FBI: "Rather than search...type the business’s URL into an internet browser’s address bar..." I'm not sure about this one. Typos easily happen, and it's the typo'd domain that scammers might own. Risky whatever way you go I suppose. For well known businesses I'd rather search and click on organic links than trust my own typing of a URL.

"Use an ad blocking extension". Third time's the charm. Great to see this advice coming from the FBI.

https://www.ic3.gov/Media/Y2022/PSA221221

◧◩◪◨⬒
367. autoex+Xr2[view] [source] [discussion] 2023-02-24 15:47:58
>>devnul+sj2
I'd be very surprised if all those problems were just theoretical even for you. Insurance companies are already using info from data brokers (https://www.propublica.org/article/health-insurers-are-vacuu...), employers are using it in employment screening (illegally) and data brokers have already been fined because of it (https://www.engage.hoganlovells.com/knowledgeservices/news/f...), it's used to set individualized prices online and offline (https://www.forbes.com/sites/adamtanner/2014/03/26/different...). Data brokers are already selling lists of people who have visited abortion clinics. (https://www.vice.com/en/article/m7vzjb/location-data-abortio...)

Companies are using every scrap of data they can get their hands on to take more of our money and they want more. The government is buying up data they can't legally collect directly. It's pretty likely that you've already experienced real world consequences of the data taken from your online activities. (https://epic.org/issues/consumer-privacy/data-brokers/)

They tell us that all the tracking we're subjected to is just about ads, but the data being collected is used all over the place offline. What we really need is privacy regulation with real teeth, but that's probably not going to happen any time soon because it's making companies tons of money. There's a multi-billion dollar a year industry around the buying and selling of the our data for a reason.

◧◩◪◨
379. slater+ZG2[view] [source] [discussion] 2023-02-24 16:51:35
>>warded+eR
Obligatory: https://youtu.be/YJg02ivYzSs?t=3
◧◩
382. timbit+SN2[view] [source] [discussion] 2023-02-24 17:25:28
>>errant+hj1
Bypass Paywalls Clean is no longer on the Firefox add-ons website.

You have to get updates here: https://gitlab.com/magnolia1234/bypass-paywalls-firefox-clea...

◧◩◪◨⬒⬓⬔
384. bacchu+9Y2[view] [source] [discussion] 2023-02-24 18:08:12
>>docmar+Qc2
ICYMI: That extension was bought up by Avast.

https://www.androidpolice.com/i-dont-care-about-cookies-acqu...

◧◩◪◨⬒⬓⬔
390. JohnFe+Zi3[view] [source] [discussion] 2023-02-24 19:36:48
>>yubiox+5E2
Oh? I thought I answered it. What are you really asking for here? A tutorial?

If that's what you want, you need to give me time to put it together. I set this up a number of years ago and don't remember the details off the top of my head.

here's what I do remember: I use a squid proxy and replace all of the HTTPS certs on my other machines with my own. When HTTPS is negotiated, it's with my proxy, not the end destination.

Then the proxy does its proxy thing and sets up a normal HTTPS connection with the destination.

In my proxy, I have a script that is looking for the HTTP lookup exchanges detailed in RFC8484 (https://www.rfc-editor.org/rfc/rfc8484). When it finds them, it drops them on the floor. Everything else just gets passed through.

◧◩◪◨⬒
404. R_VelJ+qk4[view] [source] [discussion] 2023-02-25 01:42:36
>>stjohn+yB
Instead, Apple is (https://www.macrumors.com/2022/10/13/ios-16-vpns-leak-data-e...). And so is your cell phone provider (https://techcrunch.com/2019/01/09/us-cell-carriers-still-sel...). And so is every third party app on your phone (https://www.eff.org/deeplinks/2022/06/how-federal-government...).

Carrying a smartphone is incompatible with privacy. Unfortunately, so is using a credit card (https://www.fastcompany.com/90490923/credit-card-companies-a...) and having a face (https://www.wired.com/story/get-used-to-face-recognition-in-...).

We're all doomed, so you may as well just use the software that makes you happy.

◧◩◪◨
405. archdu+Un4[view] [source] [discussion] 2023-02-25 02:13:08
>>Larrik+UJ1
I totally forgot about Ad Nauseam! I used to use it instead of uBlock Origin (which, if I remember correctly, is what Ad Nauseam actually uses for its adblocking). Google banning it from their extensions marketplace only strengthened my loathing for Google and my resolve to use it. I don’t remember why I eventually stopped - probably the inconvenience. Now that I’m a Firefox user, I should pick that back up and give it a spin again. It was entertaining to see the visualization of all the ads it had clicked on.

I also used to use Chaff (https://chrome.google.com/webstore/detail/chaff/jgjhamliocfh...), which opens up a tab and browses on its own when the browser is idle and disappears when you start using it again. As with Ad Nauseam, the means of protecting privacy behind it is not anonymity, but rather obfuscation - muddifying your actual browsing behavior by flooding the data you leave behind with junk data (at which point it ceases to be data, I suppose). The problem with that extension was that I would sit back and wait for it to start browsing, and then I’d waste too much time watching it / customizing its behavior.

The book _Obfuscation: A User's Guide for Privacy and Protest_, written by the authors who developed Ad Nauseam and TrackMeNot, has a great chapter on chaff (the obfuscation tactic, not the Chaff extension mentioned above).

◧◩◪◨⬒⬓⬔⧯
407. dngray+DD4[view] [source] [discussion] 2023-02-25 05:05:07
>>pmoria+U33
> Cookie AutoDelete

Don't bother with this extension as it can't delete other storage locations where there is persistant storage. Also Firefox has TCP, Total Cookie Protection so you don't need them anyway.

https://blog.mozilla.org/security/2021/02/23/total-cookie-pr...

Better to just sanitize on close https://www.privacyguides.org/desktop-browsers/#sanitize-on-... and maybe keep history.

If you want to keep persistent logins then whitelist those specific cookies to those specific sites or use a password manager.

◧◩◪◨⬒
408. dngray+LD4[view] [source] [discussion] 2023-02-25 05:07:13
>>pmoria+nF1
It's not really important https://blog.mozilla.org/security/2021/01/26/supercookie-pro...

The extra functionality provided by ClearURLs is not not needed with Ublock Origin's removeparam feature.

◧◩◪◨⬒⬓
423. Larrik+Z57[view] [source] [discussion] 2023-02-26 06:11:38
>>dngray+kD4
Your consistent advice in your post history is don't ever use any extensions besides uBlock Origin because of fingerprinting and "privacy"

But what if I want actually use the web instead of just blocking ads. Sponsorblock, TamperMonkey, 1Password, CamelCamelCamel, etc are all useful extensions as well that make browsing the web specifically for me better.

There are so many fingerprinting techniques that it seems pointless to have a detrimental experience generally instead of using a sandboxed computer for specific dangerous activities.

I'll continue to use Ad Nauseum, despite your recommendations against it, because I'd rather have a known worthless profile than a worthless browser.

>I also wouldn't be surprised if there isn't a way to filter out those "clicks" anyway from the ad provider's side.

Theres no evidence supporting this, but Google blocking it from the Chrome store is strong evidence that filtering out those clicks is actually difficult

Edit: Also its a moot point as extensions can't be used for fingerprinting if you just don't use Chrome https://github.com/z0ccc/extension-fingerprints#extension-fi... . I assume any activity I do in Chrome is sent back to Google (or Microsoft or Brave) regardless of plugins installed.

[go to top]