pronounced you-block origin (/ˈjuːˌblɒk/) — you decide what enters your browser.
English,
Chinese (中文),
Korean (한국어),
Português (Brasil)
BEWARE! uBlock Origin is (and has always been) COMPLETELY UNRELATED to the web site ublock.org.
An efficient blocker add-on for various browsers. Fast, potent, and lean.
uBlock Origin is NOT an "ad blocker": it is a wide-spectrum blocker -- which happens to be able to function as a mere "ad blocker". The default behavior of uBlock Origin when newly installed is to block ads, trackers and malware sites -- through EasyList, EasyPrivacy, Peter Lowe’s ad/tracking/malware servers, various lists of malware sites, and uBlock Origin's own filter lists.
Code is reviewed. Upstream changes are reviewed before being merged to the fork.
Primarily data exfiltration - scraping and sending data elsewhere. To a lesser extent, data injection. Without exfiltration, injection/impersonation is of questionable value.
- src/js/cloud-ui.js
- Cloud storage, but must be enabled, and is user-specific inside their own account. It is for storing user settings only.
- src/js/redirect-engine.js
- .post(
- .put(
- .listen(
sudo apt -yqq install git zip
git clone https://github.com/dfo-mpo/uBlock
git clone https://github.com/uBlockOrigin/uAssets
cd uBlock
# Wants to make /assets
sudo ./tools/make-assets.sh
./tools/make-chromium.sh all
ignoreScriptInjectFilters must be set to true. It would be near impossible vouch for any scriptlet injection.
ignoreRedirectFilters should also be considered to be true.
cloudStorageEnabled is a setting which respects Chrome's policy, but could also be set to false for an extra layer.
This can be done with an adminSettings file with
{
"userSettings": {
"cloudStorageEnabled": false,
},
"hiddenSettings": {
"ignoreScriptInjectFilters": true,
"ignoreRedirectFilters": true
}
}
This file can also have a whitelist section.
{
"whitelist": [
"about-scheme",
"dfo-mpo.gc.ca"
]
}