I tried aggressive mode but it didn’t work
Devs will fix it soon ig but you should hide your IP in the screenshot. Not a good thing to share your public IP address like this.
@Eleazar-N-PH let me quote Fanboynz from another post:
- The Fake VPN ads could be blocked but since one domain could have 10+ mirror sites which change weekly or monthly. So while we could block it for one domain, there would many other domains where we would need to cover. This could be resolved eventually on desktop with domain wildcards
somedomain.*##.vpn-ads
instead ofsomedomain.com,somedomain.xyz,somedomain.top##.vpn-ads
. Domain wildcards are a WIP.
When you’re dealing with websites like pirated/streaming sites, it’s going to be more challenging. Many of them use randomised adservers. This makes it harder, which is what was being said just above. They can go in and edit filter lists to block temporarily, but it’s going to be an ongoing battle as they just change it on a daily/weekly/monthly basis. There’s no “catch all” to stop them.
@Eleazar-N-PH it’s a constant battle. You know how people can create fake phone numbers and call you? You can block those phone numbers but then they just create a new one and call again. Or with email, you can block their address or domain, but then they just create a new one and send more.
That is the issue similar on that. They constantly change the domains that ads are coming from. So while they program to block on the page for a while, eventually they change and it has to repeat. It gets difficult to handle for every website.
So if you think of the current ads as a phone number, they might be able to block that for now. But then it might just try from a different number next time. This is especially true if they are monitoring and realizing when things are being blocked.
Legal sites don’t tend to go as hard on it, so it’s easier to identify who they are using for ads and to block without them changing much. But these illegal sites tend to go a bit harder on it and are doing all they can for profit.
I don’t know why this was never blocked by anyone, uBlock doesn’t block it either, so they maybe don’t consider it an ad?
It is an annoyance, and useless one.
There are many ways to block it, if it was me, I would go with yts.*##.container.home-content > .jhjh.bbj
but class might change, at least the link to the VPN changes on refresh, so it can’t be used, and since Brave doesn’t have has-text
support, it can’t be used, but I honestly don’t like Procedural Filters since they are way slower, comparing Brave/Chromium native :has()
vs Procedural filter :has()
it’s like light and day difference, native always better than some made selectors in JS by a lot.
But it can’t be blocked, maybe the classes change name? there can be used like literally anything to achieve it, from pseudo-classes to normal CSS selectors.
So you could use something like yts.*##.container.home-content > div:has([href][rel="noindex, nofollow"])
so maybe it would be safer since it seems the VPN notice always has the button with the noindex, nofollow.
and just like it, you can do a yts.*##.row > div:has([href][rel="noindex, nofollow"])
this one will hide the VPN notice on each movie. as you can see :has() makes it easier, it is supposedly to be slower, but the slow doesn’t mean anything in new computers, there ID and Class selectors are supposed to be the fastest one, at least in the tests they made like 15 years ago. (that’s why I say it doesn’t matter anymore.
BTW, the entity is supported for cosmetic rules, for anything else is not supported, so in this case it can be used yts.*
, but it can’t be used with scriptlet Injections ##+js()
or Network filters domain option $domain=
This topic was automatically closed 30 days after the last reply. New replies are no longer allowed.