forfrom1337 wrote:
If you DO NOT allow the current top-level-domain automatically and you set up "manually" which site to allow temporary, it does makes sense to keep that permission for the rest your browsing session.
Bingo! I
never allow the top-level-domain automatically. When I visit a site whose server has been hijacked, I don't want scripting to be enabled for any site to which it redirects me, i.e. it's safer to Allow a site only after seeing what site you're allowing.
but: if you, as I do, DO allow the current top-level-domain automatically, I usually do not need the permissions of the other pages I visited earlier. Best example would be facebook:
I don't have set up a specific facebook-authorization, it gets allowed as long as I'm on facebook. But I don't want to allow the facebook-scripts on any other page and yet they are, because I visited facebook earlier!
If I were you, I'd put the NoScript
Revoke Temporary Permissions button on a toolbar and click it when leaving a Facebook.
Or better yet, you can have ABE do the equivalent automatically.
http://noscript.net/faq#qa8_10
Code: Select all
# facebook.com containment rule
# This rule allows Facebook scripts objects and frames to be included only
# from Facebook pages and apps
Site .facebook.com .fbcdn.net .facebook.net
Accept from .facebook.com .fbcdn.net .facebook.net .mafiawars.com .eamobile.com
Deny INCLUSION
Alan Baxter wrote:You should never Allow an untrusted site, even temporarily.
No, of course not!

I think you're effectively doing this by
automatically TAing top-level sites. (Reference the risk of using that option I mentioned earlier.)