pronounced you-block origin (/ˈjuːˌblɒk/
) — you decide what enters your browser.
English,
Chinese (中文),
Korean (한국어),
Português (Brasil)
BEWARE! uBlock Origin is (and has always been) COMPLETELY UNRELATED to the web site ublock.org
.
An efficient blocker add-on for various browsers. Fast, potent, and lean.
uBlock Origin is NOT an "ad blocker": it is a wide-spectrum blocker -- which happens to be able to function as a mere "ad blocker". The default behavior of uBlock Origin when newly installed is to block ads, trackers and malware sites -- through EasyList, EasyPrivacy, Peter Lowe’s ad/tracking/malware servers, various lists of malware sites, and uBlock Origin's own filter lists.
Code is reviewed. Upstream changes are reviewed before being merged to the fork.
Primarily data exfiltration - scraping and sending data elsewhere. To a lesser extent, data injection. Without exfiltration, injection/impersonation is of questionable value.
- src/js/cloud-ui.js
- Cloud storage, but must be enabled, and is user-specific inside their own account. It is for storing user settings only.
- src/js/redirect-engine.js
- .post(
- .put(
- .listen(
sudo apt -yqq install git zip
git clone https://github.com/dfo-mpo/uBlock
git clone https://github.com/uBlockOrigin/uAssets
cd uBlock
# Wants to make /assets
sudo ./tools/make-assets.sh
./tools/make-chromium.sh all
ignoreScriptInjectFilters
must be set to true
. It would be near impossible vouch for any scriptlet injection.
ignoreRedirectFilters
should also be considered to be true
.
cloudStorageEnabled
is a setting which respects Chrome's policy, but could also be set to false
for an extra layer.
This can be done with an adminSettings
file with
{
"userSettings": {
"cloudStorageEnabled": false,
},
"hiddenSettings": {
"ignoreScriptInjectFilters": true,
"ignoreRedirectFilters": true
}
}
This file can also have a whitelist section.
{
"whitelist": [
"about-scheme",
"dfo-mpo.gc.ca"
]
}