• wizardbeard@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      2
      ·
      3 days ago

      Notable section from the Wikipedia article linked there as “stand out”:

      I’m not well versed on it, but I believe installed extensions are directly query-able through javascript or html5 on sites loaded by the browser.

      • rekabis@lemmy.ca
        link
        fedilink
        English
        arrow-up
        2
        ·
        1 day ago

        believe installed extensions are directly query-able through javascript or html5

        The requirement for this is that those extensions need to directly interact with - and respond to - page elements.

        Security add-ins are a “black hole” in that the vast majority of them only block, they don’t interact. There is absolutely no way for a website to tell which ad-blocker is installed from purely the ad-blocking component itself. Provided the add-on is constructed properly, it should never respond to any code either on the client-side or server-side, it should only block the browser from not even requesting certain assets in the first place. In fact, a good adblocker should be indistinguishable from a failure of DNS in providing the IP address of the ad server.

    • rekabis@lemmy.ca
      link
      fedilink
      English
      arrow-up
      1
      ·
      3 days ago

      Preaching to the choir.

      The list above is the vast majority of my add-ins. I don’t use any which are sufficiently duplicated in the browser or which are not required for enhanced security.

      I am not one of those people with multiple dozens of add-ins.

      • Turret3857@infosec.pub
        link
        fedilink
        English
        arrow-up
        1
        ·
        3 days ago

        You say you aren’t one of those people but i genuinely dont believe most of those extensions are needed if youre using hardened Firefox (LibreWolf/IronFox/Mullvad Browser/Tor)