Bash LSP server can use shellcheck and shfmt but you have to install those manually.
Funny thing is that LSP was actually created for VSCode. That’s the now standard protocol to decouple language specific things (completion, formatting, linting…) from the editor so you don’t have to use an editor for each language. You can now use any editor that supports LSP, either directly or through a plugin, and turn it into a fully fledged IDE by installing the LSP servers for the language you need. I guess some VSCode plugins use LSP under the hood and just embed the server.
Is pluging a LSP server that hard on vscode/intellij? Because it’s automatic with a lot of LSP clients, open a .sh
file, get asked if you want to install the corresponding LSP server, answer yes and that’s it. Some LSP clients don’t do automatic server install but you just have to install the server with your packet manager. At least that’s how it is with vim / emacs.
You don’t need a plugin, just use the bash LSP server with any editor that support LSP servers. It supports explainshell, shellcheck and shfmt.
uBlock Origin also does a lot more than just block request, I’m not sure features like cname uncloacking would be feasible as an userscript.
Why would you trust Greasemonkey and some random script over uBlockOrigin?
Also it might be possible to do it partly but performance would inevitably be worse and I’m not sure every functionality would be implementable.
Not sure Privacy Badger brings anything, it stopped doing local learning a long time ago. Just enable the anti tracking lists in uBO.
Those are just some uses of malwares. It’s not always that noticeable.
This is the first time you noticed you caught a malware. I wouldn’t be so confident about never having caught one and Im way more paranoid than you. This one was just really noisy.
I have only uBlock Origin and no YouTube update has gotten past it (except the first one for a few hours), I never get “disable adblocker” messages either. Also anti adblockers are not blacklist based.
Twice the chances of being detected
Double the attack surface
Half the performance
It really does not work like that. If you need a second adblocker to block somethings just enable the block list of the second one in the first one.
In fact just use uBlock Origin and be done with it.
Why would you use two adblockers?
Yeah, I don’t think that’s the best selling point for desktop use. For me it’s having all my configs for all my devices in a single place, checked in git, with bits of config I can easily share between my different devices.
Well, first of all you really should not be using Windows 7 anymore. For the TPB, I don’t think they check the torrents, anyone can upload so it’s not a trusted source. It’s in the unsafe sites list on the megathread. And how would you know that you never had a malware on the TPB?
You’re right, I should have explained.
Privacy Badger was known to be able to learn what to block but local learning could be used to fingerprint you so it was removed. Nowadays it’s only a list based blocker, while the list is still automatically generated on their side through learning it mostly overlap with regular tracking protection list used with uBlock Origin.
They also claim other features but they are either outdated (google outgoing link protection last update is 9 months old and is based on the old url schema) or already covered by uBlock Origin (uBlock Origin can now sanitize urls with the removeparam
filter, facebook outgoing link protection is included in the “AdGuard URL Tracking Protection” filter list, for third party widget blocking enable the “EasyList – Social Widgets” list).
It’s also in Arkenfox “Don’t bother” extension list.
Better use Firefox in strict mode with uBlock Origin.
In session sanitising seems pretty useless.
Click fraud is a big thing with a lot of countermeasures, it’s not as easy as adnauseum pretends it is. I doubt it does anything.
Privacy Badger is pretty useless now.
I can find the desktop client, am I missing something?