Update badware.txt with new malicious entries #31356
Closed
+2
−0
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Added new badware entry for
designrigoroso.comandpie.org.URL(s) where the issue occurs
https://designrigoroso.com/https://designrigoroso.com/*https://www.pie.org/https://www.pie.org/*Describe the issue
Both
designrigoroso.comandpie.orgexhibit behavior consistent with badware and privacy-invasive activity.The domains load third-party scripts that perform aggressive tracking and fingerprinting immediately on page load, before any meaningful user interaction or consent. Network inspection shows requests related to user profiling and telemetry collection.
pie.orgis associated with an adblock-related service that presents itself as privacy-focused, while engaging in data collection practices that contradict those claims. This creates a deceptive scenario where users may believe their browsing activity is protected when it is not.The behavior is reproducible across reloads and clean sessions and stops once the domains are blocked, indicating the issue originates from these domains.
Screenshot(s)
Screenshots attached showing network requests, third-party tracking endpoints, and script execution occurring prior to user consent, along with blocked requests after adding the domains to the badware list.
Versions
Settings
Notes
Investigation performed using browser developer tools (Network and Sources tabs). Tracking and fingerprinting scripts were consistently observed originating from these domains on page load. The issue is reproducible and independent of custom uBO settings. Blocking the domains via the badware list prevents the unwanted behavior.