Filter-lists Fingerprinting Demo

This is a demo page to test the filter-lists fingerprinting technique.

DISCLAIMER: The attacks by themselves are scriptless. All scripts in this demo are for visualization purposes or to simulate attacker servers through service-workers.

Instructions

Because we are hosting this site on GitHub pages, ad blockers will not trigger any cosmetic rule, as GitHub is flagged as a trusted site by default. This will not be the case for arbitrary websites where the attack will be hosted. To enable cosmetic rules on GitHub temporarily, you need to follow the instructions below:

For uBlock Origin
  1. Click on the uBlock Origin icon in the browser toolbar. (you could need to click on the web-extensions icon first)
  2. Click on the settings icon.
  3. When the settings page opens, go to "My Filters"
  4. Add the following rule:
    @@||github.io^$generichide,badfilter
  5. Click on "Apply changes" button
  6. Refresh the demo page
For AdGuard
  1. Click on the AdGuard icon in the browser toolbar. (you could need to click on the web-extensions icon first)
  2. Click on the settings icon.
  3. When the settings page opens, go to "User rules"
  4. Add the following rule:
    @@||github.io^$generichide,badfilter
  5. Click on "Save" button
  6. Refresh the demo page

Remember to remove this rule after finishing with this demo.