It also seems that some sites will simply break if the `<script>` they inject for the Facebook SDK fails to load (for instance, `https://www.todoexpertos.com/` in bug 1602690). As such, we would probably be best off actually "hijacking" the request, not sending it, but just returning our spoof. In my tests this works for all of the cases I've run across so far.
Bug 1226498 Comment 37 Edit History
Note: The actual edited comment in the bug view page will always show the original commenter’s name and original timestamp.
It also seems that some sites will simply break if the `<script>` they inject for the Facebook SDK fails to load (for instance, `https://www.todoexpertos.com/` in bug 1602690 and `https://plug.dj/` in bug 1515027). As such, we would probably be best off actually "hijacking" the request, not sending it, but just returning our spoof. In my tests this works for all of the cases I've run across so far.