
Loading…
Javascript-injected Ads Foil Filters #1519
tinoesroho
commented
gorhill
commented
Filters foil javascript injected ads:
photobucket.com##.sidebar > div:first-of-type
tinypic.com##.browse.columns > div:first-of-type
Edit: as per issue title, I had assumed it was a difficult case and went straight to the browser inspector, but then I tried the element picker and it made creating the proper filters even more simple. Why not just use the element picker?
publicarray
commented
@tinoesroho next time when you paste code can you please wrap it in ``` tags? Github uses GitHub Flavored Markdown and allows for easier reading & syntax highlighting.
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
As seen on tinypic.com and photobucket.com
This nasty bit of js-based ad injection has been able to foil my filters. NoScript, it turns out, did nothing to block the javascript file from loading.
At first it was loading as an external .js file, but now it's inline.
The script randomizes the div name, as far as I can tell, and then inserts a div containing ads.
try{(function(A){var R=A+'tr',g="gDeoetenwdNnrpcscya8FUtsaceagTBteeEewprsteeEtec/o.au/:th)j+-90-za(ISlahtms.8qhf4lmcnccr2c3rda656582df6b01ed-1b4f5da781/ptwlmzorjxp_mdawuteaiclgwOenwiochrewotclteuowtMeoteawrwnsw-TwerhwmNaysnmltgticwnmlearwmcpjm/ptws.]_-ZA-[=Clgwcawjzorjxp/o.dka.f.5.216f0e2f8c6f84eddc98c2fc3b/:thw__8qhf4lwonrer=tvtAlafxdiekowcasniaownmcdhawrfBrsiaspliteE6qcharAtAE7",r=gR,W=164,t=gR,E=gR;for(;W>=0;W--){r+=tgR+EgR}r=W=t=E=g=rgR;var a=window,b=a[r[0]],c=a[t[1]];
if((0<=(a[g[2]][t[3]]+c[t[4]])W[5]||0.1>=bW[7])&&!a[r[8]]){a[W[8]]={sm:t[9],lv:346,lal:0.1};var d=t[10],e=c[E[4]]W[11];e&&(d=t[13]+e[1]);var f=cW[14],h=cW[16][0];f[t[17]]=r[18];f[g[19]]=!0;f[t[20]]=d+t[9];h[W[21]]g[22]};})("subs")}catch(d){};