nuTensor
dark-knowledge
Our great sponsors
nuTensor | dark-knowledge | |
---|---|---|
13 | 14 | |
166 | 509 | |
- | - | |
0.0 | 4.6 | |
almost 3 years ago | 2 months ago | |
JavaScript | JavaScript | |
GNU General Public License v3.0 only | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
nuTensor
-
Which fork is most current?
nuTensor from geekprojects (Archived)
-
Firefox found a way to keep ad-blockers working with Manifest V3
https://github.com/geekprojects/nuTensor says their intent is to keep it working with Firefox. It is 23 commits ahead of the gorhill/uMatrix repo, but it hasn't had a commit in two years.
-
umatrix depreciated?
But nikobockerman did not commit anything. Its just a fork of the archived https://github.com/geekprojects/nuTensor. Therefore I dont see it maintained. But just now I realized you never told the fork was maintained.
-
NoScript or uMatrix?
sorry, i just realized the project is called "nuTensor", not uTensor. This is their github https://github.com/geekprojects/nuTensor
-
Per scope switches are not disabled when uMatrix is disabled for a site
You can try to write to one of the developers of forks, such as nuTensor, perhaps they can fix the problem and then you can use the fork.
-
uBlock Origin (and uMatrix) DoS with strict-blocking filter and crafted URL
The uBlock Origin patch can be cleanly applied to the uMatrix codebase. Here's the analogous PR for nuTensor: https://github.com/geekprojects/nuTensor/pull/24
The ηMatrix patch would require slight modifications due to stylistic differences between the uMatrix and ηMatrix codebases.
If the nuTensor PR gets applied and releases are made, then switching extensions might be a reasonable migration path for some users. You can also try to sideload a patched version of uMatrix, but sideloading procedures have become more onerous over time and may be annoying to deal with.
-
uMatrix has an unfixed vulnerability: here is a workaround
Manually applied the changes in this pull request from the nuTensor project to the file /src/js/main-blocked.js. :)
- Alternative to uMatrix?
-
No, uMatrix is not completely dead, and gosh no, uBlock does not replace it and NoScript whatsoever
Also uMatrix is not dead. Just use nuTensor instead. It's very simple to compile (on Linux). I don't know anything about programming but I managed, so, so can you (probably).
-
A reminder that NoScript shouldn't be trusted. Let's not forget multiple past controversies
There's the nuTensor fork which will not add features but will maintain the code.
dark-knowledge
-
Share some articles you've saved
"A curated library of research papers and presentations for counter-detection and web privacy enthusiasts": https://github.com/prescience-data/dark-knowledge
- dark-knowledge: 😈📚 A curated library of research papers and presentations for counter-detection and web privacy enthusiasts - can be applied by this community to fingerprint various threat actors
-
Can browser addons leak user data?
What you said is contrary to the stance of Tor browser devs and not backed up by actual research. Here you can find a good collection of research papers: https://github.com/prescience-data/dark-knowledge
-
Choose your browser carefully| by Unix Sheikh
Browsers are complicated and you won't find a single analysis covering all aspects. For a security analysis Madaidan's blog is a good starting point. For a privacy analysis you need to learn the common tracking methods and which solutions or mitigations are available in which browser (and if they are properly implemented). You could start by learning about the different forms of tracking through state (cookies, cache, storage, ...), which is still one of the most used tracking methods. Of course you also need to check the easy things like telemetry. Then there is fingerprinting which is a huge topic on its own. This is where it's even more fun. You need to start reading research papers, not just one but many and you need to check mitigations used in browsers and their statistical implications (data about this is unfortunately very rare).
-
Will switching to linux make it easier to fingerprint my device?
It's difficult to distinguish without having the knowledge yourself. Maybe Reddit is just not the right place, because most experts don't have the time to argue with non-experts on social media. You can look what experts write in research papers, or in the bug trackers of browsers with fingerprinting mitigations like the Tor browser.
-
Ask HN: Have you ever used anti detect browsers for web scraping?
Plus curated list of research papers here if you want to go deep on the subject matter: https://github.com/prescience-data/dark-knowledge
-
is there a need for addtl FF extensions ?
They become a significant part of your browser fingerprint. If you have a lot extensions installed, this alone could make you uniquely trackable. (See research papers here: https://github.com/prescience-data/dark-knowledge and https://fingerprintjs.com/blog/ad-blocker-fingerprinting/ )
-
VPN with best adblock?
https://github.com/prescience-data/dark-knowledge (search for "extension")
-
Browser Fingerprint
A dedicated list of research papers on browser fingerprinting: https://github.com/prescience-data/dark-knowledge
-
Avoiding Bot Detection
"I'm a noob and using python with selenium to do some basic scraping on StockX" and scraping protected website like stockx with perimeterx is not possible. It's all about reverse engineering, browser introspection, fingerprint (from hardware to software canvas), then you still need tons of ips to rotate and cooldown, finally protection evolve with time and you have to redo most of the things to pass again. A company like Scrapfly exists because it's more expensive to do and maintain such solution internally, look at their public repositories on GitHub low level stuff, network spoofing stacks, packet manipulation, custom angle libs. It takes a long time to learn vs something like `asp=true` from their docs https://scrapfly.io/docs/scrape-api/anti-scraping-protection If you have time and are more interested in this side, you could start to read https://github.com/prescience-data/dark-knowledge and look at https://github.com/berstend/puppeteer-extra/tree/master/packages/puppeteer-extra-plugin-stealth project to see how it works. Do not attempt stealth project helping you to bypass at scale, it's public, anti bot companies are aware and spot it easily - most of the time they don't block directly and use bad fp generated to recognize bots and map proxies ips to collect it and deducted the subnet or residential > My main question is, would it be better to try and make my script act "more human" It's a legend that anti bot use or detect "human" behavior, this signal is not very important, you can randomly move the mouse or things, like is fine, having 0 input events, is suspect but not that much in fact - tactile systems do not trigger any events until you touch so it can't be a strong signal due to false-positive - and doing "behavioral detection" is a big lie in the industry, you can experiment by doing dumb things, it's still passing and at scale ... and when they say "machine learning" it's just basic stats like a throttle do but based on browser fingerprints rather than IP. If you hit some path, like login, registration and payment - they can use some very heavy system with GPU canvas and stuff like but not used for scraping yet > are other methods like switching drivers and using proxies the way to go? Using proxies yes, but with wrong fingerprints (chrome headless, a browser running on server hardware, browser in docker and so on) In fact, there is no magic, mixing driver change nothing, they still manipulate a spotted browser - some are just more flexible than other to spoof correctly some part - like js worker interception to inject scripts and hook correctly but that's all.
What are some alternatives?
uMatrix - uMatrix: Point and click matrix to filter net requests according to source, destination and type
puppeteer-extra - 💯 Teach puppeteer new tricks through plugins.
nuTensor - nuTensor: Point and click matrix to filter net requests according to source, destination and type
privacytests.org - Source code for privacytests.org. Includes browser testing code and site rendering.
uAssets - Resources for uBlock Origin, uMatrix: static filter lists, ready-to-use rulesets, etc.
Windows11_Hardening - a collection about Windows 11
uBlock - uBlock Origin - An efficient blocker for Chromium and Firefox. Fast and lean.
dns-adblock - Ad, tracker, adult content and gambling blocking for our DNS blocking service [Moved to: https://github.com/mullvad/dns-blocklists]
ematrix
ags - AGS editor and engine source code
storage-partitioning - Client-Side Storage Partitioning