Closed
Bug 78105
Opened 23 years ago
Closed 23 years ago
Pattern-matching based image blocking
Categories
(Core :: Security, enhancement)
Tracking
()
People
(Reporter: the_great_spam_bin, Assigned: security-bugs)
Details
It would be really cool if, in addition to being able to block all images orginating from a given server, Mozilla could block all images from URLs matching a given pattern. On many sites, ad images originate from the same server as the non-ad images, so when the user tries to block the ad images, he or she ends up blocking the non-ad images as well. It would be nice if Mozilla, like iCab, could be set to block images originating from, for example, all URLs containing the pattern "/Ads/" thereby allowing to only block the ad images on the image server. This feature could also be useful if the ad banners are using Akamai to serve their images because although the originating server is an Akamai server, the URL still often contains a pattern matching the name of the ad provider. It would be even cooler, though not absolutely necessary, if this matching supported regular expressions.
Comment 1•23 years ago
|
||
*** This bug has been marked as a duplicate of 78104 ***
Status: UNCONFIRMED → RESOLVED
Closed: 23 years ago
Resolution: --- → DUPLICATE
You need to log in
before you can comment on or make changes to this bug.
Description
•