|
Path Blocking with Metacharacters
|
|
Apr. 01, 2016, 10:18 PM
(This post was last modified: Oct. 16, 2018 09:12 PM by Faxopita.)
Post: #22
|
|||
|
|||
|
RE: Path Blocking Using Wildcard Characters
The Non-political Correctness Block Rules
The ruleset mainly intends to block “illegitimate†requests to third-party domains underlying, for example, news sites, based on typical path patterns used by the tracking/ad industry. Useful if your blacklist does not contain the tracking domain yet. The ruleset is very well active on my own configuration. For “consuming†the web, it's near-ideal. For buying stuffs online, prepare to completely whitelist some shops or unblock only problematic requests by reviewing the latest crunched requests in your logfile. The ruleset is especially useful if you are really angry, frustrated and furious against the ad/tracking industry. Though not 100% impervious to tracking, it should be a real option to consider if you want to protect, for example, your little family against insidious tracking. Why? Because the ruleset is “quite†susceptible, as you will quickly notice… It's also a good alternative to blocking JavaScript everywhere because the requests initiated by running JavaScript codes will be blocked: OS and browser specs, screen size and resolutions, sites you visit, hashes, id, IP, geolocation, web-based cryptomining, etc. Notes #1:
—–- Activate permanently Privoxy's logfile. Clear it daily—for example, with a cron job—so it doesn't inflate indefinitely. Make sure debug 1024 is not commented out in Privoxy's config file! You review the latest blocked queries to fix browsing issues. You can grep lines containing Blocked: instances. Create an alias to speed up the process… If you just want to clear Privoxy's logfile content at 8 p.m. daily: Code: 0 20 * * * echo $(grep "toggle?\(mini=y&\)\?set=\(enable\|disable\)" /private/var/log/privoxy/logfile.log | tail -1) > /private/var/log/privoxy/logfile.logSame job but at reboot time only: Code: @reboot echo $(grep "toggle?\(mini=y&\)\?set=\(enable\|disable\)" /private/var/log/privoxy/logfile.log | tail -1) > /private/var/log/privoxy/logfile.logTo list your cron jobs: `contrab -l`. -–— Humble opinion about the rule set RefusedPath.action: I find it useful—given its susceptibilities—to protect against malvertising (have a look at this website and that one, BTW), to kill questionable request attempts based on their path patterns, including those from email spams. I personally can no longer navigate the web without it. The rule set is the result of a thorough daily analysis—started in Nov. 2014—of my Privoxy's log file. Malvertising: malvertising involves the triggering of a chain of queries; at some point, this ruleset will likely block at least one of them, thus stopping the malware to be downloaded. Think about it. My personal configuration is such that out of 100 requests, 30 to 35 of them are routinely blocked. It also blocks at least 20,000 request attempts per week, or close to one million “useless†(analytics, avatars, fonts, stats, widgets) and “illegitimate†(ads and tracking) request attempts annually. Now, how much is the total size of these resources that did not get downloaded over that period? Along with these big numbers, I still enjoy a far more than acceptable web browsing experience. When I read this or that, I do definitely want to use my unforgiven set of rules! Oh, by the way, this one is a very good report on today's tracking practices… Test any visited site with whotracks.me for fun… Don't forget to read the other posts #18 and #21 as well… Notes #2:
-–— Minuscule donations are always appreciated… Code: BTC --> 34WKogWorDoReJ2MSxw8rTsrGD87VMAPJY—–- Download counter for the July release: 37 |
|||
|
« Next Oldest | Next Newest »
|

Search
Member List
Calendar
Help





![[-]](images/ONi/collapse.gif)