You are right, my bad, last change seems to be a year ago.
You are right, my bad, last change seems to be a year ago.
But uBlock Origin does not set update_url
in it’s manifest.json
so it won’t update automatically. You’d have to do it manually every time.
It’s really standard to leave some time for users to adapt when making a big change. Especially end users. It’s actually a good thing, the “friend showing up” analogy makes no sense.
End of support for users is June 2024.
But it did seem to have changed a year ago or so, my bad.
But if the extension is removed from the store you will not get updates.
I don’t get it, the timeline has been known since 2021 and has not changed. We are in the middle of the phase-out. All of this is really predictable.
https://developer.chrome.com/docs/extensions/develop/migrate/mv2-deprecation-timeline
For system wide DNS blocking you only have two options: use a DNS server with blocking (either your own with something like a piHole our a public one) or use the hosts file.
Depends on the country you’re in.
without being pwned
How do you know?
My next phone is definitely going to be a Pixel for this reason. But my current one is not even 6 years old so I’ll wait a bit.
It has some deal breaking limitations:
The Russian government has also allegedly begun preparations to block the WhatsApp messaging app.
https://kyivindependent.com/messenger-signal-blocked-in-russia-media-says/
My question was more about the motives in this case.
I don’t get it, are you really arguing that Russia and Venezuela are blocking Signal to protect their citizens from American snooping?
Telegram is not secure, I guess if you can listen to it better not block it.
Thanks, nice to have someone knowledgeable.
Would you say matrix is censorship resistant? I’ve very limited knowledge of it but given what you said I imagine that if I was trying to block matrix I would just need to query the url of the text file and check the DNS text entry, if either exist just add the domain to the blocklist.
Being decentralized prevents DNS or IP blocks but not blocks through DPI.
Signal has an option to masquerade it’s traffic as regular HTTPS, I don’t know if Matrix can do such a thing.
Privacy Badger stopped using heuristic 4 years ago because it could be used to fingerprint you.
Cookie autodelete simply does not work with Firefox’s Total Cookie Protection, which is enabled by default.
As of Firefox 86, strict mode is not supported at this time due to missing APIs to handle the Total Cookie Protection. Also as of Firefox 103, standard mode has also enabled Total Cookie Protection. Use ‘strict’ mode if using pre-86, use standard mode for versions 86-102, or from version 103+ use the custom configuration and set cookie to ‘cross site tracking cookies’ option (not the cross-site cookies).
https://addons.mozilla.org/fr/firefox/addon/cookie-autodelete/
You don’t even need an extension to automatically delete cookies, just enable privacy.sanitize.sanitizeOnShutdown
and privacy.clearOnShutdown_v2.cookiesAndStorage
. To add an exception: Ctrl+I>Permissions>Cookies>Allow.
Check Arkenfox’s extension page and the section about sanitizing on shutdown.
The fork was 11 years ago, so a lot. So much that they are considered different engines now.
It’s a good thing to be able to communicate without sarcasms when it’s not called for.
But I don’t think it’ll change, feel free to try and make a PR but you’ll also need to setup a server to host the releases and
update.xml
.