sigmoid.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A social space for people researching, working with, or just interested in AI!

Server stats:

597
active users

#ublockorigin

4 posts4 participants1 post today

Paying bills at the end of the month has become so painful. Aside from the actual financial details, I still have to block ads from apartment complex, phone company, etc. after uBlock Origin does its thing. Some of these are really shameful, like offering to split rent payments to every two weeks if you take out a pay-day loan at crazy interest rates every month. Then I'm also blocking "AI answers" when I shouldn't have to search so hard to find "Pay Bill" in the first place. No, I'm too close to the edge to turn on autopay, just charge me $10 more a month to subject me to more ads, thanks. Then when I do pay it's "Looks like something went wrong! Please try again." and an email confirming payment in my inbox.

As always, #AdBlocking is #infosec:

infosec.exchange/@InfobloxThre

If you're still using #GoogleChrome or #MicrosoftEdge then switch to #Firefox and install the #uBlockOrigin extension. It works on desktop and on Android. That alone will give you a safer, more enjoyable browsing experience.

Infoblox Infographic – Inside of malicious adtech:Who's who
Infosec ExchangeInfoblox Threat Intel (@InfobloxThreatIntel@infosec.exchange)Attached: 1 image Like CEOs at Coldplay concerts, we keep finding malicious adtech hiding behind well-known advertising brands. While these platforms may appear credible, they allow malicious actors access to their platform, and profit from their successes. Our posts often focus on adtech operators because they are the ones who manage the infrastructure. But they are not the only ones profiting from this business. Affiliates play a big role by driving traffic (aka visitors) to the adtech platform (TDS). Malicious affiliates do this by tricking visitors into clicking hidden links or manipulating pages to redirect them automatically. They are so good at it that they generate a profit just due to the sheer volume of traffic they drive into the platform. Legitimate affiliates do this by posting what they believe to be normal ads on their web pages, tempted by promises of big rewards. Unfortunately for them, this is rarely the reality, and there are many reports of affiliates being underpaid or not paid at all. Additionally, affiliates risk damaging their own brand image – no one wants their legitimate website redirecting to malware, right? As a user, regardless of how you find yourself diverted into a malicious TDS, if you happen to fit the profile then you face the risk of being sent to a malicious landing page. Scams, disinformation, malware…you name it. As there are many players involved in this scheme, we’ve created an infographic that highlights who they are and how they fit into the malicious adtech landscape. Have you come across any of these shady platforms or, worse, been lured into becoming part of the scheme? Let us know! #dns #threatintel #threatintelligence #cybercrime #cybersecurity #infosec #infoblox #infobloxthreatintel #adtech #maliciousadtech #advertising #affiliates #scam #malware #phishing

This post explains why and how Kaushik Gopal uses Firefox and provides some handy tips.

He recommends enabling the AdGuard filters in the uBlock Origin settings but the extension flags all of them as out of date. Any issues with these filters?

Update: I need to refresh and apply the filter list. Thanks @laurentb

kau.sh/blog/how-to-firefox

kau.sh🦊 How to Firefox - Kaushik Gopal's WebsiteChrome finally pulled the trigger on the web’s best ad-blocker, uBlock Origin. Now that Chrome has hobbled uBO, Firefox—my beloved—1 is surging again. I want to do my part to convince you to switch to Firefox and show you how I use it.

EDIT: my uBlock Origin was way outdated, updating fixed it, thanks @heldenstad (have now set add-ons to auto-update too)

---

Just in the last couple of days, I've noticed #ublockorigin has become very aggressive, making even the rendering of Wikipedia pages horrible.

Anyone else get this? I imagine it has something to do with one of the blocklists, but don't know how to figure out which without switching each on off :/

Nobody: "How much bullshit can we shove into our website?"

#deel: YES!

And that's just the crap that #uBlockOrigin and #NoScript caught:

deel.com
api.deel.com
app.deel.com
amazonaws.com
a569f72b706584c51b5f33f0e47ccd30-e12968bbf00b014c.elb.eu-west-1.amazonaws.com
wiki.deel.network
braze.com
sdk.iad-06.braze.com
cal.com
app.cal.com
calendly.com
assets.calendly.com
chilipiper.com
js.chilipiper.com
com.cdn.cloudflare.net
api.deel.com.cdn.cloudflare.net
api.deel.com
d20qeu5vw8i5t2.cloudfront.net
cdn.zapier.com
d3kz3mviooatoq.cloudfront.net
avatars.slack-edge.com
deel.network
wiki.deel.network
deel.tools
openreplay-new.deel.tools
google.com
apis.google.com
www.google.com
googletagmanager.com
www.googletagmanager.com
gstatic.com
fonts.gstatic.com
www.gstatic.com
k8s-openrepl-awsalbin-ed4c403a34-602701419.eu-west-1.elb.amazonaws.com
openreplay-new.deel.tools
letsdeel.com
media.letsdeel.com
s3.amazonaws.com
sammylabs.com
api.sammylabs.com
sentry.io
o265775.ingest.sentry.io
slack-edge.com
avatars.slack-edge.com
stripe.com
js.stripe.com
m.stripe.com
q.stripe.com
stripe.network
m.stripe.network
stripecdn.map.fastly.net
m.stripe.network
zapier.com
cdn.zapier.com
 …deel.com
…braze.com
…cal.com
…calendly.com
…chilipiper.com
…deel.network
…deel.tools
…google.com
…googletagmanager.com
…gstatic.com
…s3.amazonaws.com
…sammylabs.com
…stripe.com
…stripe.network
…zapier.com

Seriously, I get that not everyone is able to do #accessible and #performant #forms and #Websites and that #JavaScript is trendy and hip.

  • But this seriously isn't funny anymore, but insulting!