You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Instart Logic is an adblock-circumventing service that uses a "nanovisor" (often identifiable by the string g00) to make third-party requests appear as first-party requests.
When loading these sites with Ka-Block! 3.1, many images are broken. On closer inspection, this is because the images do not have a src attribute, but rather a x-defer-src attribute. There is javascript to un-break this attribute, but it's (sorta correctly) blocked by the sdad\\.guru rule.
I don't know if Safari Content Blockers have the tools to deal with this. uBlock Origin uses websockets to solve this issue. It seems like preventing inline javascript from navigating to a blocked page (as opposed to navigating to a Safari error page) would be a partial solution, but I don't know if that's possible.
Instart Logic is an adblock-circumventing service that uses a "nanovisor" (often identifiable by the string
g00
) to make third-party requests appear as first-party requests.A long list of sites using Instart Logic is given in the background links below, but I am specifically having trouble with Gamepedia sites such as https://mtg.gamepedia.com and https://dota2.gamepedia.com.
When loading these sites with Ka-Block! 3.1, many images are broken. On closer inspection, this is because the images do not have a
src
attribute, but rather ax-defer-src
attribute. There is javascript to un-break this attribute, but it's (sorta correctly) blocked by thesdad\\.guru
rule.I tried creating the following rule…
…but this doesn't work because the main page (e.g. https://mtg.gamepedia.com/Main_Page) uses inline javascript to navigate to a page with
g00
in it (e.g. https://mtg.gamepedia.com/g00/Main_Page?i10c.encReferrer=&i10c.ua=4, but it then rewrites the URL as https://mtg.gamepedia.com/Main_Page to hide the fact that it navigated you), which results in a Safari error page. If you disable javascript entirely, you can verify that the images do havesrc
attributes at the original page, and it's only theg00
page that has obfuscated them.I don't know if Safari Content Blockers have the tools to deal with this. uBlock Origin uses websockets to solve this issue. It seems like preventing inline javascript from navigating to a blocked page (as opposed to navigating to a Safari error page) would be a partial solution, but I don't know if that's possible.
P.S. Thanks for Ka-Block! ❤️
The text was updated successfully, but these errors were encountered: