Conversation

This Tweet was deleted by the Tweet author. Learn more
Replying to and
I don't think it's helpful to spread misinformation about it. The main issue with the proposed draft of the declarative API is the limit of 30000 static rules which is still provisional and they should be pressured to raise it before it ships. It's also genuinely a good approach.
1
1
Replying to and
It's very similar to Safari content blockers. A declarative API is more efficient and enables extensions to offer content filtering without needing to see the content of the requests / responses. There are still more complex valid uses for programmatic webRequest blocking though.
1
1
The placeholder values (30000 static rules, etc.) were set as a lower bound to avoid a situation like setting it to 3000000 and then needing to lower it to 500000 at a later point. It has been officially stated a bunch of times that the shipped values are going to end up higher.
1
Replying to and
NoScript allows you to block all JS by default (the most secure way to browse the web). This doesn't allow for that AFAIK. NoScript also has other security features like XSS detection which needs to be able to read requests.
2
1
Replying to and
> NoScript allows you to block all JS by default I'm well aware of what NoScript does along with extensions with similar features like uMatrix. > This doesn't allow for that AFAIK. I linked to the API documentation above which clearly shows that what you're saying isn't true.
2