statsig spyware (very privacy invasive, also added in hagezi dns):
||prodregistryv2.org^
flowgpt.com spyware. very privacy invasive and makes hundreds of requests per minute.
||data-ingestion.flowgpt.com^
||flowgpt.com/marketing/ (not tracking, but prevents loading of heavy resources that doesn't affect user)
||flowgpt.com/mp/track
||tianji.flowgpt.com^
relatively new. collects timestamp/trace. so not blocked anywhere else.
||awswaf.com/*/telemetry
this affects all website that uses AWS WAF to protect themselves (this is similar to cloudflare's turnstile). for example you can try signing up to huggingface.co (reputable ML platform) with a vpn or something and inspect network requests.
Hetzner first party matomo analytics.
||use.hetzner.com^
Teachable.com (and any platform that uses teachable) collects data via:
||eventable.internal.teachable.com^
tested for 2 months with no breakage.
All the reports are manually inspected from EU region.
Prerequisites
Problem description
Visual Studio Code Marketplace (marketplace.visualstudio.com)
||marketplace.visualstudio.com/_apis/*/stats (page events) ||marketplace.visualstudio.com/_apis/ClientTrace/ (error reporting) ||marketplace.visualstudio.com/_apis/customerintelligence/ (analytics)
nextjs and vercel cookie consent can be more efficiently blocked by prevent loading of this file (only apply to EU as mentioned):
/fides.js$domain=nextjs.org|vercel.com
spyware: ||nextjs.org/api/ai/ping ||nextjs.org/api/stream/internal ||vercel.com/api/stream/internal
figma annoyance: cookie notice and indismissable sign in prompt.
figma.com##[class^="base_cookie_banner"] figma.com##[class^="footer_banner--googleBanner"]
statsig spyware (very privacy invasive, also added in hagezi dns):
||prodregistryv2.org^
flowgpt.com spyware. very privacy invasive and makes hundreds of requests per minute.
||data-ingestion.flowgpt.com^ ||flowgpt.com/marketing/ (not tracking, but prevents loading of heavy resources that doesn't affect user) ||flowgpt.com/mp/track ||tianji.flowgpt.com^
relatively new. collects timestamp/trace. so not blocked anywhere else.
||awswaf.com/*/telemetry
this affects all website that uses AWS WAF to protect themselves (this is similar to cloudflare's turnstile). for example you can try signing up to huggingface.co (reputable ML platform) with a vpn or something and inspect network requests.
Hetzner first party matomo analytics.
||use.hetzner.com^
Teachable.com (and any platform that uses teachable) collects data via:
||eventable.internal.teachable.com^
tested for 2 months with no breakage.
All the reports are manually inspected from EU region.
Proposed solution
Add these rules to AdGuard filters
Additional information
No response