Code: Select all
https://anime-pictures.net/pictures/view_post/474561?lang=en&by_tag=130671
It also appears that some of U-Login's scripts are pretty transparent injectors for trackers and visit counters. Looking into the petition log, I noticed some invisble frames and a JavaScript.
/match
redirects to uptolike
, uptolike
contains an image that's already blocked by EasyPrivacy, and the ones with stats
inject something. I tried blocking them and I could still log-in via Facebook.Could someone check and refine these filters?
Code: Select all
||u-login.com/js/stats.js$script
||u-login.com/stats.html$document,subdocument
||u-login.com/uptolike/$document,subdocument
||u-login.com/match$document,subdocument
Code: Select all
^notaku^$domain=anime-pictures.net
There's also an ad in the sidebar, but that's already blocked by a generic filter at EasyList:
-300x250-$image
. There's probably a better filter for that kind of images, but I don't know what could it be.