Bash LSP server can use shellcheck and shfmt but you have to install those manually.
Bash LSP server can use shellcheck and shfmt but you have to install those manually.
Funny thing is that LSP was actually created for VSCode. That’s the now standard protocol to decouple language specific things (completion, formatting, linting…) from the editor so you don’t have to use an editor for each language. You can now use any editor that supports LSP, either directly or through a plugin, and turn it into a fully fledged IDE by installing the LSP servers for the language you need. I guess some VSCode plugins use LSP under the hood and just embed the server.
Is pluging a LSP server that hard on vscode/intellij? Because it’s automatic with a lot of LSP clients, open a .sh
file, get asked if you want to install the corresponding LSP server, answer yes and that’s it. Some LSP clients don’t do automatic server install but you just have to install the server with your packet manager. At least that’s how it is with vim / emacs.
You don’t need a plugin, just use the bash LSP server with any editor that support LSP servers. It supports explainshell, shellcheck and shfmt.
uBlock Origin also does a lot more than just block request, I’m not sure features like cname uncloacking would be feasible as an userscript.
Why would you trust Greasemonkey and some random script over uBlockOrigin?
Also it might be possible to do it partly but performance would inevitably be worse and I’m not sure every functionality would be implementable.
Those are just some uses of malwares. It’s not always that noticeable.
This is the first time you noticed you caught a malware. I wouldn’t be so confident about never having caught one and Im way more paranoid than you. This one was just really noisy.
I have only uBlock Origin and no YouTube update has gotten past it (except the first one for a few hours), I never get “disable adblocker” messages either. Also anti adblockers are not blacklist based.
Twice the chances of being detected
Double the attack surface
Half the performance
It really does not work like that. If you need a second adblocker to block somethings just enable the block list of the second one in the first one.
In fact just use uBlock Origin and be done with it.
Why would you use two adblockers?
Yeah, I don’t think that’s the best selling point for desktop use. For me it’s having all my configs for all my devices in a single place, checked in git, with bits of config I can easily share between my different devices.
Well, first of all you really should not be using Windows 7 anymore. For the TPB, I don’t think they check the torrents, anyone can upload so it’s not a trusted source. It’s in the unsafe sites list on the megathread. And how would you know that you never had a malware on the TPB?
That’s all true, but why take a modified chromium instead of a modified Firefox?
Also clearurls and decentraleyes would be pretty much useless with Firefox and uBlock Origin.
From what I gathered Amazon is the only one that includes an identifier. Look for a string starting with “atv:kin”.
The DeDRM fork removes it: https://github.com/noDRM/DeDRM_tools/blob/bf2471e65b1f52bb5292caeba70a9aea31bf6653/DeDRM_plugin/mobidedrm.py#L254
Some have an interview process in place (notably redacted). Once you get in a first one (either through interview, open signup or any other way) you can start climbing the ranks, at some point you should have access to an invite section on the tracker forum where you can find invites to other trackers (not all trackers have an invite forum and they don’t have access to the same invites).
It does not. Domain based blocking does not work with youtube.
Your link event says it:
Some ads may […] be served through the same domain as the website, making them harder to block without blocking the website itself.
There is no point in using a proxy for this, because of https it won’t be able to block more than with DNS blocking. Maybe a tiny bit more if you set up mitm but that’s really not worth it.
This, of course, can only tell you if an apk is malicious, it cannot tell you if it is not malicious.
Seems really fishy.
Quite a few trackers: https://reports.exodus-privacy.eu.org/en/reports/com.hsv.freeadblockerbrowser/latest/
And so many red flags like a free VPN (so they route all your traffic), “powered with AI technology” (what for?), not open source…
A browser is a very sensitive piece of software, you trust it with a lot of personal data. Don’t use a random one like this one.
https://github.com/bash-lsp/bash-language-server#dependencies