@ Barbaz.
I'm very sorry for such a late reply.I had been very busy.
Okay,I'll rephrase the question in the most basic way possible.
1.How does NS blocks inline scripts?
1.1.How does NS blocks inline scripts with CAPS in Fx28,& newer Fx versions?
2.In about:config what Preference name(s) controls this?
3.What are the values?
A bit more...
4.If an inline Iframe,or an inline Frame has an inline script inside of it.Is the inline script blocked by default? (I think so.)
If not.See #3 above.
5.If an inline script is 3rd. party.
For example:inside the inline script.the inline script
also calls on a 3rd. party JS:
http://thirdparty.com/blah/bad.js
Is the 3rd. party script blocked,or goes undetected? (I think it's blocked like always.)
Something else to consider...
6.If an inline Iframe,or an inline Frame
also calls on a 3rd. party Iframe,or a 3rd. party Frame:
http://thirdparty.com/blah/bad.html (Yes,frames inside frames.)
Then,the original inline Iframe,or the original inline Frame also has an inline script inside of it.That
also calls on a 3rd. party JS...WTF happens then?
Yes,I had seen this,& if I could remember an example.I would give it to you.
Even worse...
7.What if the 3rd. party Iframe,or the 3rd. party Frame have their own inline scripts,that
also call on a
4th. party JS?...Wait,my eyes are bleeding...

What happens then?
Yes,this answers my questions,but it does not apply to inline Iframes,or an inline Frames:
https://noscript.net/faq#qa4_8
guest wrote:
What's the difference if the Frames,or Iframes are done in a regular way,or as inline.They'll be there regardless of the delivery method.
Otherwise why bother blocking the Frames,or Iframes at all.
So please ask Giorgio for this feature request.
Please see
http://noscript.net/faq#qa4_8. This feature is in NoScript to help prevent *cross-site* attacks; blocking part of the page itself isn't going to do anything in that regard.
Sounds like what you want is an annoyance zapped, not a security feature.. and NS isn't an annoyance removal tool except coincidentally. So unless you can show by example that IFRAME srcdocs can be exploited just like "normal" IFRAMEs in a way that has security implications, this feature request has no use in NoScript.
I think we all know that NS is a security tool.The fact that NS blocks ads,or annoyances are just beneficial side effects.
Look at it this way:
1.
Pretty much every website uses inline Iframes,or inline Frames.They are only annoyances because they were designed that way.They could just as easily had been designed to be malicious.With no way to stop them.WHAT WILL YOU DO THEN???
If you want to wait until you,or someone else gets attacked,& hopefully not suffer the consequences.That's fine,but I would take preventative measures now.
2.Reasons/Questions 4-7 above.
3.Inline pics.
At this point everybody uses them,& with no "reqular" ways to block any of these.It's just a matter of time before disaster strikes.
If you still refuse...how about a surrogate to block inline Iframes,& inline Frames?
While surrogates are mostly for JS.Will it work for inline Iframes,& inline Frames?
Finally...Like you guys always say:It can't hurt to ask.
PLEASE ask Giorgio to block inline Iframes,& inline Frames in NS just like blocking regular Iframes,& Frames.
Code: Select all
noscript.surrogate.byeinlinesvg.replacement : window.addEventListener('load', function() {for (let e of document.getElementsByTagName('svg')){e.parentNode.removeChild(e);} }, false);
noscript.surrogate.byeinlinesvg.sources : !@^https?://
Wow thanks.
I was going to ask for a surrogate in my last reply,but you beat me to it.Glad you're 1 step ahead of me.
I'll test it when I have more time.
Since we are on the subject of pics...
Barbaz,I would like to know your personal opinion on this.
We all know that Giorgio for some unknown reason thinks that blocking pics has something to do with ads instead of security. (Which is not true.)Not to mention that a million people had failed to convince him otherwise. (Privacy=Security.)
Lets use scorecardresearch.com as an example.
You can black list it/untrusted it,& then go to Options-Embeddings-"Check" Block every object from a site marked as untrusted.
However,you still get that invisible 1x1 pixel web bug/beacon.
Wouldn't it be nice if you could block that pic without a host list,ABP/something similar,or an ABE rule?
BTW,this should also apply to inline pics.
What do you think?
Speaking of which,please remind me.
If you select Block every object from a site marked as untrusted.Are CSS,& XML blocked?