They do kill uBlock Origin. The Lite version is a different extension.
Yes but that’s not the same. Because of Chrome limitation it can’t update it’s blocklist directly. You have to update the whole extension to update the blocklist and that goes through Google validation in the Chrome store. It adds delay and Google could even refuse some updates. The blocklist is also shorter because not all filter rules are supported.
You really shouldn’t connect windows 7 to the internet.
But it’s not run in a sandbox. I’m not sure where you get this from.
Same, I could not go back now.
It build in a sandbox, but it’s not run in a sandbox.
Bash LSP server can use shellcheck and shfmt but you have to install those manually.
Funny thing is that LSP was actually created for VSCode. That’s the now standard protocol to decouple language specific things (completion, formatting, linting…) from the editor so you don’t have to use an editor for each language. You can now use any editor that supports LSP, either directly or through a plugin, and turn it into a fully fledged IDE by installing the LSP servers for the language you need. I guess some VSCode plugins use LSP under the hood and just embed the server.
Is pluging a LSP server that hard on vscode/intellij? Because it’s automatic with a lot of LSP clients, open a .sh
file, get asked if you want to install the corresponding LSP server, answer yes and that’s it. Some LSP clients don’t do automatic server install but you just have to install the server with your packet manager. At least that’s how it is with vim / emacs.
You don’t need a plugin, just use the bash LSP server with any editor that support LSP servers. It supports explainshell, shellcheck and shfmt.
uBlock Origin also does a lot more than just block request, I’m not sure features like cname uncloacking would be feasible as an userscript.
Why would you trust Greasemonkey and some random script over uBlockOrigin?
Also it might be possible to do it partly but performance would inevitably be worse and I’m not sure every functionality would be implementable.
Not sure Privacy Badger brings anything, it stopped doing local learning a long time ago. Just enable the anti tracking lists in uBO.
Those are just some uses of malwares. It’s not always that noticeable.
This is the first time you noticed you caught a malware. I wouldn’t be so confident about never having caught one and Im way more paranoid than you. This one was just really noisy.
I have only uBlock Origin and no YouTube update has gotten past it (except the first one for a few hours), I never get “disable adblocker” messages either. Also anti adblockers are not blacklist based.
Twice the chances of being detected
Double the attack surface
Half the performance
It really does not work like that. If you need a second adblocker to block somethings just enable the block list of the second one in the first one.
In fact just use uBlock Origin and be done with it.
How do you know?