1
0
mirror of https://github.com/gorhill/uBlock.git synced 2024-07-05 11:37:01 +02:00

this removes obsolete resources

This commit is contained in:
gorhill 2016-03-27 12:31:04 -04:00
parent eca9dc3bba
commit 54176612fd
3 changed files with 0 additions and 262 deletions

View File

@ -1,9 +1,7 @@
8cebf7ef8d801c5aef9a48d85fc45a8b assets/ublock/unbreak.txt
62111a29f0a5cb361ba8dbae92054adb assets/ublock/redirect-resources.txt
7b860287140f033765f8e635d87cd6e8 assets/ublock/privacy.txt
f74b74a8556873a3c073470ef246f869 assets/ublock/filters.txt
98088252cedafb8571cf61b91bea219e assets/ublock/badware.txt
5baa90e2da7cd6a73edff2010557ee57 assets/ublock/redirect.txt
89f1a0b14271b83ca4980a3373d5fc12 assets/ublock/experimental.txt
44bd125e64b5990745e5d8126a50ec80 assets/ublock/resources.txt
059e0bfbf22bd242dda7b07389fe09a2 assets/ublock/filter-lists.json

View File

@ -1,237 +0,0 @@
# Resources to be used as redirect destinations.
#
# - Each distinct resource entry is separated by an empty line.
# - The first line in a resource entry is: token mime-type[;encoding]
# - All following lines are the data. An empty line signals the end of the
# data.
#
# If the encoding is absent, the data will be converted to base64, and the
# encoding will be set to `;base64`.
# http://probablyprogramming.com/2009/03/15/the-tiniest-gif-ever
1x1-transparent.gif image/gif;base64
R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==
2x2-transparent.png image/png;base64
iVBORw0KGgoAAAANSUhEUgAAAAIAAAACCAYAAABytg0kAAAAC0lEQVQI12NgQAcAABIAAe+JVKQAAAAASUVORK5CYII=
# Obsolete: to be removed -- need to stick to sensible resource names
handtinytrans.gif image/gif;base64
R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==
noopcss text/css
noopjs application/javascript
(function() {
;
})();
noopframe text/html
<!DOCTYPE html>
<html>
<head><title></title></head>
<body></body>
</html>
hd-main.js application/javascript
var L = (function(){
var l = {};
var noopfn = function() {
;
};
var props = ["pf", "ed", "Qe", "fd", "xh", "Uc", "ef", "zd", "Ad", "Qc", "Ri", "Wc", "Vc", "Xc", "Wg", "rd", "qd", "sd", "Pe", "Id", "Hd", "Jd", "fg", "Fd", "Ed", "Gd", "ek", "Cd", "Bd", "Dd", "Nj", "Sc", "Rc", "Tc", "wg", "xd", "wd", "yd", "fh", "ld", "md", "nd", "Re", "cd", "Pc", "ke", "Yc", "Xg", "jd", "kd", "oh", "ad", "bd", "mi", "gd", "hd", "ae", "dd", "fk", "ij", "ud", "td", "vd", "ig", "od", "pd", "Yd", "$j", "Oc", "bf"];
for (var i = 0; i < props.length; i++) {
l[props[i]] = noopfn;
}
return l;
})();
fuckadblock.js-3.2.0 application/javascript
(function() {
var noopfn = function() {
;
};
//
var Fab = function() {};
Fab.prototype.check = noopfn;
Fab.prototype.clearEvent = noopfn;
Fab.prototype.emitEvent = noopfn;
Fab.prototype.on = function(a, b) {
if ( !a ) { b(); }
};
Fab.prototype.onDetected = function() {
return this;
};
Fab.prototype.onNotDetected = function(a) {
a();
return this;
};
Fab.prototype.setOption = noopfn;
window.FuckAdBlock = Fab;
//
window.fuckAdBlock = new Fab();
})();
antiAdBlock.js application/javascript
(function() {
window.antiAdBlock = {
onDetected: function() {
;
},
onNotDetected: function(a) {
a();
}
};
})();
# To neutralize GA scripts. The goal is to provide the minimal API
# expected by clients of these scripts so that the end users are able
# to wholly block GA while minimizing risks of page breakage.
# Test cases (need way more):
# - https://github.com/chrisaljoudi/uBlock/issues/119
www.google-analytics.com/ga.js application/javascript
(function() {
var noopfn = function() {
;
};
//
var Gaq = function() {
;
};
Gaq.prototype.Na = noopfn;
Gaq.prototype.O = noopfn;
Gaq.prototype.Sa = noopfn;
Gaq.prototype.Ta = noopfn;
Gaq.prototype.Va = noopfn;
Gaq.prototype._createAsyncTracker = noopfn;
Gaq.prototype._getAsyncTracker = noopfn;
Gaq.prototype._getPlugin = noopfn;
Gaq.prototype.push = function(a) {
if ( typeof a === 'function' ) {
a();
}
};
//
var tracker = function() {};
tracker._getLinkerUrl = function(a) {
return a;
};
//
var tracker = {
_initData: noopfn,
_trackPageview: noopfn
};
//
var Gat = function() {
;
};
Gat.prototype._anonymizeIP = noopfn;
Gat.prototype._createTracker = noopfn;
Gat.prototype._forceSSL = noopfn;
Gat.prototype._getPlugin = noopfn;
Gat.prototype._getTracker = function() {
return tracker;
};
Gat.prototype._getTrackerByName = function() {
return tracker;
};
Gat.prototype._getTrackers = noopfn;
Gat.prototype.aa = noopfn;
Gat.prototype.ab = noopfn;
Gat.prototype.hb = noopfn;
Gat.prototype.la = noopfn;
Gat.prototype.oa = noopfn;
Gat.prototype.pa = noopfn;
Gat.prototype.u = noopfn;
var gat = new Gat();
window._gat = gat;
//
var gaq = new Gaq();
(function() {
var aa = window._gaq || [];
if ( Array.isArray(aa) ) {
while ( aa[0] ) {
gaq.push(aa.shift());
}
}
})();
window._gaq = gaq.qf = gaq;
})();
# Ubiquitous googletagservices.com: not blocked by EasyPrivacy.
# "Tags are tiny bits of website code that let you measure traffic and
# "visitor behavior"
googletagservices.com/gpt.js application/javascript
(function() {
var noopfn = function() {
;
};
//
var gpt = window.googletag || {};
gpt._vars_ = gpt._vars_ || {};
gpt.cmd = gpt.cmd || [];
gpt.getVersion = gpt.getVersion || noopfn;
//
window.googletag = gpt;
})();
# https://forums.lanik.us/viewtopic.php?f=91&t=27188
i.ligatus.com/*/angular-tag.js application/javascript
(function() {
self.adProtect = true;
})();
# Yavli ads. These are blocked using an inline script tag filter, but this
# works only on Firefox. So we side-load the following script using whatever
# script is normally blocked on the site.
yavli-defuser.js application/javascript
(function() {
try {
Object.defineProperty(window, '__durl', {
set: function() {
;
},
get: function() {
return '';
}
});
Object.defineProperty(window, '__lsurl', {
set: function() {
;
},
get: function() {
return '';
}
});
Object.defineProperty(window, '__lturl', {
set: function() {
;
},
get: function() {
return '';
}
});
} catch (ex) {
}
})();
# Addefend defuser
uabinject-defuser.js application/javascript
(function() {
window.uabpdl = window.uabInject = window.uabDetect = true;
})();

View File

@ -1,23 +0,0 @@
# uBlock Origin -- To redirect blocked resources to neutered contents.
#
# The redirect tokens reference an entry in the resource library:
# https://github.com/gorhill/uBlock/blob/master/assets/ublock/redirect-resources.txt
||s3.amazonaws.com/homad-global-configs.schneevonmorgen.com/hd-main.js$script,domain=cdnapi.kaltura.com|spiegel.de|stern.de|t-online.de,redirect=hd-main.js
||hgc.svonm.com/hd-main.js$script,domain=cdnapi.kaltura.com,redirect=hd-main.js
# Proof of concept: no need to open ourselves to more 3rd-party scripts/frames in
# order to prevent blocker bypass. The `important` filter option is used here
# to override EasyList exception filters for this case: ideally exception filters
# should be avoided as much as possible.
||ads.ad-center.com/smart_ad/display?ref=*&smart_ad_id=$subdocument,domain=dayt.se,redirect=noopframe,important
||ads.ad-center.com^$subdocument,domain=dayt.se,redirect=noopframe,important
||aflrm.com^$subdocument,domain=dayt.se,redirect=noopframe,important
||dayt.se^*fuckadblock.js$script,redirect=fuckadblock.js-3.2.0,important
||imads.integral-marketing.com^$domain=dayt.se,important
# https://github.com/gorhill/uBlock/issues/1078
||eurotransport.de/*/antiAdBlock.js$script,first-party,redirect=antiAdBlock.js
# https://forums.lanik.us/viewtopic.php?f=91&t=27188
||i.ligatus.com/*/angular-tag.js$script,redirect=i.ligatus.com/*/angular-tag.js