without being pwned
How do you know?
without being pwned
How do you know?
While the code being open is good you still have to rely on trust.
I certainly don’t have the time to review to code of each extension I use. And even then, we have no garanties that the extension distributed through the browser stores has the same code.
You can see the issue was opened on august 18th but the responsible commit was only made on the 19th. So the code was pushed the extension users before it was made available on the repository. Open code is of no help here.
It just showed the developer is not to be trusted.
I agree, there are a bunch of annoying limitations. But it’s better than nothing. To me the best vim based browser is qutebrowser, too bad it’s using chromium.
How does it compare to tridactyl?
All of them except uBlock Origin are in Arkenfox “Do not bother” extension list: https://github.com/arkenfox/user.js/wiki/4.1-Extensions#-dont-bother
You really shouldn’t connect windows 7 to the internet.
Bash LSP server can use shellcheck and shfmt but you have to install those manually.
Funny thing is that LSP was actually created for VSCode. That’s the now standard protocol to decouple language specific things (completion, formatting, linting…) from the editor so you don’t have to use an editor for each language. You can now use any editor that supports LSP, either directly or through a plugin, and turn it into a fully fledged IDE by installing the LSP servers for the language you need. I guess some VSCode plugins use LSP under the hood and just embed the server.
Is pluging a LSP server that hard on vscode/intellij? Because it’s automatic with a lot of LSP clients, open a .sh
file, get asked if you want to install the corresponding LSP server, answer yes and that’s it. Some LSP clients don’t do automatic server install but you just have to install the server with your packet manager. At least that’s how it is with vim / emacs.
You don’t need a plugin, just use the bash LSP server with any editor that support LSP servers. It supports explainshell, shellcheck and shfmt.
uBlock Origin also does a lot more than just block request, I’m not sure features like cname uncloacking would be feasible as an userscript.
Why would you trust Greasemonkey and some random script over uBlockOrigin?
Also it might be possible to do it partly but performance would inevitably be worse and I’m not sure every functionality would be implementable.
Those are just some uses of malwares. It’s not always that noticeable.
This is the first time you noticed you caught a malware. I wouldn’t be so confident about never having caught one and Im way more paranoid than you. This one was just really noisy.
I have only uBlock Origin and no YouTube update has gotten past it (except the first one for a few hours), I never get “disable adblocker” messages either. Also anti adblockers are not blacklist based.
Twice the chances of being detected
Double the attack surface
Half the performance
It really does not work like that. If you need a second adblocker to block somethings just enable the block list of the second one in the first one.
In fact just use uBlock Origin and be done with it.
Why would anyone use a browser that requires you to login, especially after that: https://kibty.town/blog/arc/