![]() ![]() ![]() Most browsers cannot detect or block these, and while there are lists, it is necessary to manage the lists manually unless a browser or extension is used that comes with better protection options. Most content blockers distinguish between first and third party resources, and CNAME tracking uses this to avoid detection.īroken down, the technique makes a resource look like its first party when in fact it is not. Sites and Internet marketing companies may use CNAME cloaking to avoid detection by content blockers, regardless of whether they are integrated in the browser natively, provided by browser extensions, or through other means such as the HOSTS file or DNS.ĬNAME tracking, also called CNAME cloaking, works through redirects by using subdomains of the main domain which are then redirected automatically to a tracking domain. The Firefox-version of uBlock Origin is therefore the most effective when it comes to content blocking. The developer was the first to introduce such functionality in a browser extension, but could do so only in Firefox as Mozilla's browser was, and is, the only browser that supports DNS API capabilities that make such functionality possible in first place. Raymond Hill, maker of the popular content blocker uBlock Origin, introduced support for CNAME-based blocking in the Firefox version one year ago. The feature landed in Brave Nightly already and will be integrated in the stable version of the browser in the coming release. ![]()
0 Comments
Leave a Reply. |