Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[May NSFW] gelbooru.com (New ads elements) #30

Closed
kowith337 opened this issue Aug 4, 2016 · 6 comments
Closed

[May NSFW] gelbooru.com (New ads elements) #30

kowith337 opened this issue Aug 4, 2016 · 6 comments

Comments

@kowith337
Copy link

kowith337 commented Aug 4, 2016

Subscribed: Fanboy Ultimate List

Some ads frame still show, regardless of using uBlock Origin to block all third party.

newgel1
Sorry, it need to censor it out.

and seems their try to avoid blocking by made some change like this.

ccbill_typo

  • Framed ads that make hyperlink to ccbill.com (locate above page navigation), but need to look at that typo, their use .Com instead of .com
  • Their mirrored ads by hosted "webm" file in their domain, but before named as "b.webm", I see it named as "mnfclub.webm" before they change, probably to avoid blocking.
  • More think to see, their include ads from exoclick.com as iframe, too. but look closer, their avoid blocking again by change .com as .cOm

Elements may should block.

gelbooru.com##center div[style="width:1000px; overflow:hidden;"]
to hide an element that contains 2-3 iframes (probably) that located above page navigation.

gelbooru.com##.sidebar iframe
to hide tall ads that show at left side (that frame contains image that was encoded as base64, also hyperlink when clicked that ads also encoded, too.)

Network request that may should block

||gelbooru.com/*_loader
to block frontend_loader.js and backend_loader.php that loaded to use with or improvement of showing ads from exoclick.com
a file backend_loader.php is seems reference to tall ads banner that located at left side after end of tag lists.

||gelbooru.com$media
Currently I don't know any possible that their may to change file type, but it need to prevent video ads that their mirrored from "mnfclub" and self-hosted.
Just hiding element isn't prevent site load video file, so I need to use this rule for blocking it, but...

@@||gelbooru.com/images^$media
is needed to whitelisted to make sure content that uploaded by their users are viewable and not blocked by mistake for user side. (due to new update for that site was able to upload and see webm videos)

@ryanbr
Copy link
Owner

ryanbr commented Aug 4, 2016

@ryanbr
Copy link
Owner

ryanbr commented Aug 28, 2016

Has been resolved, no more ads seen.

@ryanbr ryanbr closed this as completed Aug 28, 2016
@kowith337
Copy link
Author

kowith337 commented Sep 9, 2016

WebM Video ads re-appear.
I'm look for some part of code, old code of center div is <div style="width:1000px; overflow:hidden;">
but for now is <div style="display:block; overflow:hidden; width:1000px;">
Just swapped between width and overflow, additional is insert display, probably nothing special here.
But again, they changed href typo by using http://refer.Ccbill.cOM/...

for self-solution, I've added gelbooru.com##center div[style*="width:1000px"] to my filter to remove entire additional footer area, include that video ads.

screenshot 10

@ryanbr
Copy link
Owner

ryanbr commented Sep 10, 2016

@kowith337
Copy link
Author

It's OK for now.
*Tested on Fennec F-droid 48.0 + uBO 1.9.4

----- Reply message -----
From: "Fanboynz" notifications@github.com
To: "ryanbr/fanboy-adblock" fanboy-adblock@noreply.github.com
Cc: "Kowith Singkornkeeree" kowith337@hotmail.com, "Author" author@noreply.github.com
Subject: [ryanbr/fanboy-adblock] [May NSFW] gelbooru.com (New ads elements) (#30)
Date: Sat, Sep 10, 2016 11:13 AM

easylist/easylist@369a824

You are receiving this because you authored the thread.
Reply to this email directly or view it on GitHub:
#30 (comment)

@kowith337
Copy link
Author

Can I Re-suggestion here? it seems your list was allowed some script from ExoClick ads. (Now seems gone?)
For my purpose, allow only this
@@||gelbooru.com/script/application.js?$script
Yes, strictly application.js? because it seems every request that called core script to load is have some numbers behind question mark, guess it's a script version.

||gelbooru.com^$script,subdocument
to block application.js.php, it's a script file that named as php file that their make it to fool whitelist rules in adblockers extensions, also I guess they will reuse old trick to bypass and keep serve ads and popunder that their created frontend_loader.js and backend_loader.php in the past to serving ads by add script code to first party server to bypass blocking because most blocking rules are focus to block third party.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants