In Brave for Windows, Shields ā Trackers & ads blocking is Standard. When I go to brave://flags/#brave-adblock-cname-uncloaking, it is āDefault (Enabled)ā. That is, the default under Standard is to uncloak Cname. I do not have to change to aggressive blocking mode to get Cname uncloaking enabled. I did not set it to Enabled. It was at āDefault (Enabled)ā already while in standard block mode. For Brave for Windows, the default in standard blocking mode is to uncloak Cnames.
In Brave for Android, and also at standard blocking mode, brave://flags/#brave-adblock-cname-uncloaking is āDefault (Disabled)ā. For Brave for Android, the default in standard blocking mode is NOT to uncloak Cnames.
This is inconsistent safety setup. Both instances of Brave are set to standard blocking mode, but Cnames are uncloaked on Windows, by default, while Cnames are not uncloaked on Android, by default. If it is a good safety feature on Windows, the same should be true on Android.
Perhaps aggressive mode overrides the flags, but then there is no documentation to tell me just what aggressive mode does versus standard mode. Personally I donāt believe standard/aggressive mode has anything to do with Cname uncloaking in Brave. Those appear to be independent, especially since it is documented that way.
Iāve used uBlock Origin (the MV2 version) with its Cname uncloaking option enabled for years, and sites did not break because of it. Cname cloaking allows 3rd-party servers to disguise themselves as 1st-party servers, but that doesnāt affect the DNS lookup will still point to the same place with the same IP address from a lookup. Cname uncloaking is essential in the fight against ad servers pretending to be something else. Makes no sense why the default on Android is for Brave not to uncloak Cnames. This is not aggressive blocking. This is Cname redirect exposure which allows the blocklists to cover even the cloaked Cnames. Blocklists are standard blocking, not aggressive. Uncloaking Cnames it not iself a block action. It unhides the hidden (redirected) 3rd-party domain, so adblockers are not thwarted.
Characterizing CNAME cloaking-based tracking
Brave performed best, but that is because the Windows version mustāve been used in the testing where Cname uncloaking is enabled, by default, regardless of the standard/aggressive blocking mode. The test would not have been as favorable on Android (where Firefox Android with the MV3 version of uBlock Origin with its Cname cloaking enabled) where Cname uncloaking is DISABLED, by default.
An important safety feature, Cname uncloaking, which prevents thwarting the blocklists used by adblockers is disabled, by default, in Brave for Android. The default for Cname uncloaking should the SAME for Brave whether on Windows or Android.
Iāll review https://github.com/brave/brave-browser/issues?q=is%3Aissue%20cname to see if I can determine why Braveās author enabled Cname cloaking on Windows, but disabled it on Android. There are about 51 tickets on ācnameā. Probably get back to this in a couple hours.