Jump to content

Sampei.Nihira

Member
  • Posts

    1,270
  • Joined

  • Last visited

  • Days Won

    30
  • Donations

    0.00 USD 
  • Country

    Italy

Posts posted by Sampei.Nihira

  1. For you who use browsers that are probably not already patched, I am including the fix that is valid for Chromium-based browsers:

    https://github.com/webmproject/libwebp/commit/902bc9190331343b2017211debcec8d2ab87e17a

    https://github.com/webmproject/libwebp/releases/tag/v1.3.2

     

    For Firefox:

    https://hg.mozilla.org/releases/mozilla-release/rev/e245ca2125a6eb1e2d08cc9e5824f15e1e67a566

     

    P.S.

    Pale Moon has already fixed this vulnerability.

  2. Thank you for your response.
    There is also this list to put in uBlock Origin:

    https://www.i-dont-care-about-cookies.eu/abp/

    But it doesn't solve the problem.
    In the case I could have extracted the rules that prevented the consensus display.

    In chromium-based browsers you can block Google.com/en cookies and the Google translator web page consent is also prevented.

    In Firefox there is a different handling with cookies,probably introduced with Total Cookie Protection.
    If you block third-party cookies (you can do it in custom) you give up Total Cookie protection.

    But even doing that I couldn't.
    This is not my area of expertise so I need help.

    I don't use that translator but that's just the way I am,this forcing bothers me.:yes:


    .

  3. On 4/21/2023 at 9:51 AM, msfntor said:

    I use sometimes Safer Redirects extension: https://chrome.google.com/webstore/detail/safer-redirects/ecejaaoknpcjfheoejampbickooodnna

    - you could find another similar one (or Domain Whitelist?..), and post here your findings... 

    This question is OT.
    And I would not usually answer it.

    I recently returned from a trip to Sicily (3 hours from the city where Giorgio Maone resides) so I will make an exception for you.;)

    I would use (but do not use) this extension:

     

    https://chrome.google.com/webstore/detail/skip-redirect/jaoafjdoijdconemdmodhbfpianehlon

     

    :hello:

  4. On 4/21/2023 at 9:39 AM, msfntor said:

    On Chrome Web Store, under this extension User Reviews, I've found this user review:

    "Lee Hodsdon May 6, 2019

    ... Alas, in a new PC build, I lost the user-defined rules that I had in uBlock Origin. I remember figuring out a rule that would kill sites from adding their searches to Chrome. There was a directive in the page to perform the auto-add, and it was that element that I had blocked in uBO. I'll add another reply if I figure it out again. With that rule in uBO, I monitored the search engine list in Chrome and none got auto-added after several months."

    - so search for this uBlock rule...

    The rules I have,some time ago,added to uBlock Origin did not prevent the automatic addition of some search engines,so I went back to the extension.

    I probably don't have the expertise to do this work.

    Certainly mr. Hill himself could do it (but I know his grumpy nature so he wouldn't).
    Another candidate who might succeed would be Yuki2718.

  5. It is very simple to check if the blocking rule (inserted in my filters) is working.
    Open the browser development tools and reload our MSFN forum.
    In the images below I show you how this is done.

    Rule up and running:

    image.jpg

    uBO without the blocking rule:

    2.jpg

    Then it is obvious that if you check the API (BrowserLeaks.com  - test Features Detection) this is present and working.

     

  6. 1 hour ago, NotHereToPlayGames said:

    Interesting.

    Is there a quantifiable means of elliminating "Placebo Effect" in determining if this really "does" something?

    Quote

     

    A new power scheme – Ultimate Performance: Demanding workloads on workstations always desire more performance. As part of our effort to provide the absolute maximum performance we’re introducing a new power policy called Ultimate Performance. Windows has developed key areas where performance and efficiency tradeoffs are made in the OS. Over time, we’ve amassed a collection of settings which allow the OS to quickly tune the behavior based on user preference, policy, underlying hardware or workload.

    This new policy builds on the current High-Performance policy, and it goes a step further to eliminate micro-latencies associated with fine grained power management techniques. The Ultimate Performance Power plan is selectable either by an OEM on new systems or selectable by a user. To do so, you can go to Control Panel and navigate to Power Options under Hardware and Sound (you can also “run” Powercfg.cpl). Just like other power policies in Windows, the contents of the Ultimate Performance policy can be customized.

    As the power scheme is geared towards reducing micro-latencies it may directly impact hardware; and consume more power than the default balanced plan. The Ultimate Performance power policy is currently not available on battery powered systems.

     

     

    https://blogs.windows.com/windows-insider/2018/02/14/announcing-windows-10-insider-preview-build-17101-fast-build-17604-skip-ahead/

  7. I recently activated this plan that is usually hidden.

    Info on how to make this change can be found on the net.

    I also improved the performance (but not at the expense of security) of my web browser,Edge.

    It is interesting to consider from a survey I created on Wilders Security Forum that only one other user uses this power plan.

    The majority of users use the recommended power plan.

  8. I have a question.

    Why do you question (mistakenly) my expertise in security/privacy?

    You get the opposite purpose.

    I understand (well) the degree of expertise of others.
    It would probably be more useful to ask for explanations or to do research on the net.

    Having clarified the above,the explanation that should not be necessary, the rule I wrote has general validity.
    Only the rule for whitelisting is obviously specific.

    Every website that needs a consent rule,then,must be added with the exact same syntax.

     

  9. Because you don't need a browser extension, moreover outdated,to block SW.
    A simple rule in uBlock Origin is enough:

     

    ||$csp=worker-src 'none',domain=~whitelistthisdomain.com

    But the biggest problem is understanding when a malfunctioning website needs Service Workers.

    It is difficult especially if you have subjected the browser to considerable customization.

     

  10. Problems for uBlock Origin in the CWS:

    Quote

     

    Chromium: Submission pending

    Note: I am unable to publish a new version in the CWS, the version 1.48.0 went back to Pending review status after I raised the distribution to 100%, despite that version being currently distributed by the CWS. I suggest you just move to a browser which supports timely update -- the CWS is a burden when it comes to publish emergency revisions.

     

     

    https://github.com/gorhill/uBlock/releases/tag/1.48.4

    UBO in my Edge (Microsoft Store) is already updated to the latest version 1.48.4:

    1.jpg

    I also report that at the Chrome Extensions Detection test:

    https://browserleaks.com/chrome

    I have no detection of extensions.

    2.jpg

     

    P.S.

    I have no idea if uBlock Origin can be installed in Chromium-based browsers (not Edge) from the Microsoft Store.

    But personally with respect to Gorhill's advice (switch browser) I would recommend forum members to install the latest version of UBO from Github.

  11. 1 hour ago, msfntor said:

    @Sampei.Nihira; Well, I'll spare you this time, but please don't be mean in the future. If you are Italian, you should know that my opinion of Italians was good for the moment...

    What does it have to do with forgiving you?
    I replied to you 2 times and I point out to my first reply you even quoted me.

    Whatever.

    I also point out to you that I answered your question in full.
    You, on the other hand, did not write to me that you did what I had graciously told you to do.
    Not that you have to do it,but at least some education.......:hello:

     

  12. 42 minutes ago, msfntor said:

    "Your browser has a randomized fingerprint" - what extension (Trace?) or setting you use in Chrome, please... (this is firefox maybe)...

    Your other screenshots are like mine...

    The browser is Edge.
    The only extension against fingerprinting is JShelter settings to default.
    You probably have some browser command-line or extension that prevents JShelter from doing a good job.

  13. A very good Browserleaks test should be so even in the presence of the detectable extensions installed:

    1.jpg

    The ECH test should look like this:

    2.jpg

    Cover You Track:

    3.jpg

     

    P.S.

    This my d3ward test without adblocker:

    4.jpg


    Let's assume that you have to disable even momentarily the adblocker in a problematic website.....what do you do you give up blocking trackers,CNAME trackers.......

×
×
  • Create New...