Code: Select all
case,domain=focus.de|stern.de|sat1.de|prosieben.de|kabeleins.de|sat1gold.de|sixx.de|prosiebenmaxx.de|fem.com|the-voice-of-germany.de|wetteronline.de|wetter.com|finanzen.net|tvspielfilm.de|gamestar.de|pcwelt.de|boerse-online.de|sportauto.de|auto-motor-und-sport.de|motor-klassik.de|4wheelfun.de|autostrassenverkehr.de|lustich.de|itectale.de
If an adblocker is detected they will insert the ads as pictures with random filenames hosted on the original url.
If you try to block these pictures you might break the whole layout of the page.
Currently trying to fight this kind of anti-adblock is too demanding, as the trigger-element is constantly renamed to avoid adblock whitelisting.
There are better solutions out there that use GreaseMonkey Userscripts to disarm the javascript that detects Adblock and creates the nasty ad pictures.
https://openuserjs.org/scripts/schwarzt ... d_Klatsche for example.
The problem is, that it requires a secondary browser extension and the users knowledge that such scripts exist.
I therefore hope that ABP will eventually step up their arsenal to disarm that kind of ads as well.
Ublock seems to have done so in their latest release: https://github.com/gorhill/uBlock/releases/tag/1.2.0
Add custom cosmetic filter www.focus.de##script:contains(uabInject)