Skip to content

Loading…

Javascript-injected Ads Foil Filters #1519

Open
tinoesroho opened this Issue · 2 comments

3 participants

@tinoesroho

As seen on tinypic.com and photobucket.com

This nasty bit of js-based ad injection has been able to foil my filters. NoScript, it turns out, did nothing to block the javascript file from loading.

At first it was loading as an external .js file, but now it's inline.

The script randomizes the div name, as far as I can tell, and then inserts a div containing ads.

try{(function(A){var R=A+'tr',g="gDeoetenwdNnrpcscya8FUtsaceagTBteeEewprsteeEtec/o.au/:th)j+-90-za(ISlahtms.8qhf4lmcnccr2c3rda656582df6b01ed-1b4f5da781/ptwlmzorjxp_mdawuteaiclgwOenwiochrewotclteuowtMeoteawrwnsw-TwerhwmNaysnmltgticwnmlearwmcpjm/ptws.]_-ZA-[=Clgwcawjzorjxp/o.dka.f.5.216f0e2f8c6f84eddc98c2fc3b/:thw__8qhf4lwonrer=tvtAlafxdiekowcasniaownmcdhawrfBrsiaspliteE6qcharAtAE7",r=gR,W=164,t=gR,E=gR;for(;W>=0;W--){r+=tgR+EgR}r=W=t=E=g=rgR;var a=window,b=a[r[0]],c=a[t[1]];
if((0<=(a[g[2]][t[3]]+c[t[4]])W[5]||0.1>=bW[7])&&!a[r[8]]){a[W[8]]={sm:t[9],lv:346,lal:0.1};var d=t[10],e=c[E[4]]W[11];e&&(d=t[13]+e[1]);var f=cW[14],h=cW[16][0];f[t[17]]=r[18];f[g[19]]=!0;f[t[20]]=d+t[9];h[W[21]]g[22]};})("subs")}catch(d){};

@gorhill

Filters foil javascript injected ads:

photobucket.com##.sidebar > div:first-of-type
tinypic.com##.browse.columns > div:first-of-type

Edit: as per issue title, I had assumed it was a difficult case and went straight to the browser inspector, but then I tried the element picker and it made creating the proper filters even more simple. Why not just use the element picker?

@publicarray

@tinoesroho next time when you paste code can you please wrap it in ``` tags? Github uses GitHub Flavored Markdown and allows for easier reading & syntax highlighting.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Something went wrong with that request. Please try again.