NanoCore
privacytools.io
Our great sponsors
NanoCore | privacytools.io | |
---|---|---|
15 | 310 | |
477 | 3,024 | |
- | - | |
5.1 | 6.8 | |
over 3 years ago | over 2 years ago | |
HTML | ||
GNU General Public License v3.0 only | Creative Commons Zero v1.0 Universal |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
NanoCore
-
Extension developers - watchout for shady offers to buy/collaborate/help monetize
If you feel like reading a lot, you can see a nice example here: https://github.com/NanoAdblocker/NanoCore/issues/362 (popular addon is sold to 2 Turkish developers and author is happy that he made money and that someone will continue his project, except they released malware with the first update :D)
-
Firejail that shit!
Nano-Defender List for uBO, it wasn't great to begin with (based on Reek's Anti-Adblock Killer, which is known to cause issues), but for like half a year ago the project (the list's accompanying Chrome addon to be precise) has been sold to malware distributors: https://github.com/NanoAdblocker/NanoCore/issues/362
-
uBlock Origin works best on Firefox (technical analysis)
this is the original github discussion in all its glory. people were absolutely trashing the developer for their actions, and rightfully so
-
Nano Defender filter list URls are broken, has anyone found a fix? Does anyone know why it's broken?
Forgot to mention the obvious: uninstall now -- with those capabilities, it should be considered malware. Source: https://github.com/NanoAdblocker/NanoCore/issues/362#issuecomment-709456180
-
3 Million Google Chrome Users were Infected by Malicious Extensions and More Keep Popping Up
I remember the cases of two addons being hijacked for malware distribution: The Great Suspender and one called Nano Adblocker. At least in the case of the former, not only were the changes not published on github, code had been added to obfuscate debugging through the browser; Code was also added to detect and obfuscate its code if it detected that the user was trying to inspect/debug the addon from within the browser using the developer console. The author of Ublock Origin shares his analysis of that here.
- MailCow being sold
- Malware in open-source web extensions
-
Impossible? Someone Has Drained my Entire Nano S / Ledger Live wallet without Ledger Connected?
Unless you have seen all the data surrounding Ledger Live you wouldn't know. From Malicious Nano Defenders Adblocks designed to infiltrate you and data mine you specifically. Raymond Hill creator of ublock comments here https://github.com/NanoAdblocker/NanoCore/issues/362#issuecomment-709428210 ... To leaking all personal data on its customers... their is more obviously.... Run... Final conclusion GUILTY, not only for negligence but intent to isolate target and steal its own customers monies.
- US blacklists Xiaomi, major Chinese firms over military links
-
LCK could not reach a broadcasting right with YouTube
Didn't the new owners of these extensions start to collect information? https://github.com/NanoAdblocker/NanoCore/issues/362#issuecomment-709428210
privacytools.io
-
Ash HN: My country is undergoing a coup, which encryption software should I use?
FYI, Privacy Guides is a shitshow. It was formerly privacytools.io[1], and in 2019, the creator[2] of privacytools.io stopped contributing[3] and a new contributor[4] immediately focused on donations[5], became the admin[6] and took control[7] of most assets, including donations but excluding the domain and Twitter account[8]. In 2021, the creator of privacytools.io launched a new privacytools.io[9] and added affiliate links[10], and the Privacy Guides team shut down r/privacytoolsIO rather than return it[11] to the creator. Like I said, a shitshow.
[1] https://github.com/privacytools/privacytools.io
[2] https://www.reddit.com/user/BurungHantu
[3] https://github.com/privacytools/privacytools.io/commits?auth...
[4] https://github.com/jonaharagon
[5] https://github.com/privacytools/privacytools.io/commits?afte...
[6] https://github.com/privacytools/privacytools.io/commit/4b60a...
[7] https://redd.it/tuo7mm
[8] https://twitter.com/privacytoolsIO
[9] https://redd.it/pxtw2y
[10] https://www.reddit.com/r/VPNTorrents/comments/raftz6/i_made_...
[11] https://redd.it/qk7vn0
-
Top Android Phones From China Are Packed With Spyware, Research Finds
Yes, we know you're still mad we won't add Threema. It was thoroughly discussed in our old organization.
-
L'Europe se dirige vers une fermeture de Facebook après que l'Irlande a déclaré qu'elle envisage d'empêcher Meta d'envoyer les données des utilisateurs européens vers les États-Unis
en 2019: Signal has copious privacy issues making it unfit for privacytools.io endorsement.
-
Is Signal %100 open source?
Signal is just another walled garden and has a lot of other problems too: https://github.com/privacytools/privacytools.io/issues/779
- Why is it a good idea to stay updated and avoid unsupported releases
-
Lukol – A “Privacy” Search Engine
Or the fork which is much more active these days https://docs.searxng.org/
In the past it Lukol served Google Ads: https://github.com/privacytools/privacytools.io/issues/1557#...
-
Will mu4e+mbsync not work for Gmail after this month?
Never heard of it. Fastmail apparently never made it on to the privacytools.io list for its geographical location. See here for some other recommendations. There are also malifence and posteo. I use posteo and mailbox.org. The main two weird things about posteo is that there is no spam folder (detected spam is rejected with no option to change this), and you can't use a custom domain (because they don't want to have any information on you/your name). Mailbox.org can optionally reject spam and lets you use your custom domain. I like it a lot so far.
- How Signal keep his independency
-
Brave is rolling out a new feature called De-AMP, which allows Brave users to bypass Google-hosted AMP pages, and instead visit the content’s publisher directly
The correct link is https://github.com/privacytools/privacytools.io/pull/657
-
All privacy tools we recommend on a single page
Worth noting the "admins" of that site wrote the content for it, check for yourself https://github.com/privacytools/privacytools.io/commits/master BurungHantu hadn't written anything really since 2016.
What are some alternatives?
Platform - Qbix Platform for powering Social Apps (http://qbix.com/platform)
privacyguides.org - Protect your data against global mass surveillance programs.
NanoDefenderFirefox - An anti-adblock defuser for uBlock Origin on Firefox
brave-browser - Brave browser for Android, iOS, Linux, macOS, Windows.
user.js - user.js -- Firefox configuration hardening
nitter - Alternative Twitter front-end
thegreatsuspender - A chrome extension for suspending all tabs to free up memory
BlockTheSpot - Video, audio & banner adblock/skip for Spotify
opensnitch - OpenSnitch is a GNU/Linux interactive application firewall inspired by Little Snitch.
libreddit - Private front-end for Reddit
google_translate_this - This WebExtension translates the current page with Google Translate. It does so on demand so it does not change the page unless the user selected this. It is fast, light and privacy friendly.
Pi-hole - A black hole for Internet advertisements