New
#31
New update: Last modified: 21 03 2018 22:39
https://raw.githubusercontent.com/Ze.../hosts_browser
New update: Last modified: 21 03 2018 22:39
https://raw.githubusercontent.com/Ze.../hosts_browser
Update: HOSTS file method doesn't block this particular script. It still gets blocked by my AV. However improvements to Firefox mean that it's no longer a problem. If I switch to another browser even with updated hosts file and coin block addons the script still tries to activate.
Lesson learned. Use Firefox for certain websites. Basic protection works.
Source:
Firefox Working on Protection Against In-Browser Cryptojacking Scripts
The cryptojacking blocking system is currently hidden in Firefox Tracking Protection using a list of domains associated with advertisers that have a habit of secretly tracking users across multiple sites.
Since November 16th this list has also been blocking the domains of Coinhive and Crypto-Loot, two companies that provide in-browser mining services.
One might say blocking two domains wouldn't be enough to make a dent. But according to statistics Bleeping Computer received from US security researcher Troy Mursch, the Coinhive JS script is found on 81.6% of all web domains that include a cryptojacking script, while Crypto-Loot is ranked #5 on that list, so, despite blocking just two domains, this list covers quite a lot of ground.
Last edited by Callender; 25 Mar 2018 at 11:04. Reason: highlight link
A former member here NoelC I think was his name wrote a host compiler program that helps to keep the file updated and you can find it in the link below. Been using it for a while and it works well
http://win10epicfail.proboards.com/t...own-hosts-file
Interesting routine. Thanks for posting it. Think I will hold off running it, waiting for others with more knowledge to comment.