From 8bfcd2f05a28f5aca60e4f45ed78374c062f2ec1 Mon Sep 17 00:00:00 2001 From: Raymond Hill Date: Mon, 25 Jan 2016 11:16:31 -0500 Subject: [PATCH] Created Strict blocking (markdown) --- Strict-blocking.md | 33 +++++++++++++++++++++++++++++++++ 1 file changed, 33 insertions(+) create mode 100644 Strict-blocking.md diff --git a/Strict-blocking.md b/Strict-blocking.md new file mode 100644 index 0000000..38a2e3b --- /dev/null +++ b/Strict-blocking.md @@ -0,0 +1,33 @@ +[Back to Wiki home](https://github.com/gorhill/uBlock/wiki) + +*** +In uBlock Origin ("uBO"), _strict blocking_ is the blocking of a whole page, i.e. even the root document is blocked, so that not a single connection is made to the remote server hosting the web page. + +By default, strict blocking is enabled in uBO (this is the opposite of Adblock Plus). + +Adblock Plus only blocks secondary resources (see [web pages _themselves_ are **never** filtered](https://adblockplus.org/forum/viewtopic.php?t=18774#p85439)). + +So if you were to create a filter such as `||example.com^`, and then navigate to , Adblock Plus would not prevent you from connecting and loading the web page itself served at `https://example.com`, though all secondary resources pulled by that web page would be subject to filtering. + +uBO respected that semantic until version 0.9.3.0. With version 0.9.3.0, uBO will subject web pages themselves to filtering. + +This means that using the same test case above, **uBO will block the web page** served by a server found in one of the malware list (unlike Adblock Plus): + +![Page was fully blocked](https://cloud.githubusercontent.com/assets/585534/8160013/14466ca0-133a-11e5-8d3c-28169288f35a.png) + +Why the change? Because [issue #1013](https://github.com/chrisaljoudi/uBlock/issues/1013) brought forth why it is desirable sometimes to completely block a web site, as opposed to what the ABP-filtering semantic dictates. + +In the end, the chosen solution is to now have web page themselves subject to filtering, just like all secondary resources. + +In the figure above, the user will be given the choice to go back by closing the window or proceed to the web page by disabling strict blocking by selecting either: + +- Temporarily - The site will be temporarily allowed for a limited time (currently set at 60 seconds). +- Permanently - The site will be permanently allowed. + +This will prevent the web page _proper_ for the site from being blocked by uBO in the future: the filtering of the site will be done exactly as per ABP-filtering semantic, and just like with uBO pre-0.9.3.0. + +There are many benefits to strict blocking. For example, there is no good reason one should want to connect _at all_ to any of the sites present in any one of the malware domain lists. Strict blocking will prevent this from happening. + +**Important note:** Keep in mind that when the above warning occurs, it doesn't necessarily mean the site is harmful, it just means that there is a matching filter in the selected filter lists. You decide whether the site is safe, and whether disabling strict blocking permanently for the site is appropriate. + +**Tip:** If you wish, you may entirely disable strict blocking everywhere by adding the rule `no-strict-blocking: * true` to the _My rules_ pane in the dashboard (don't forget to click _Commit_ to make the rule stick).