[Trying to press the back button will place you on xhamsterlive.com the filter xhamster.com##+js(addEventListener-defuser.js, popstate, backUrl) should fix it but it doesn't anymore. I tried to abort the entire script window.initials but this prevents the videos from loading possibly other side effects. I can't seem to find anyway to prevent the backUrl from showing up.]
It also shows up on FF. I noticed they changed the name of the big script in the page source. It used to be window.js_vars now it's window.initials. Strangely the xhamster.com##+js(addEventListener-defuser.js, popstate, backUrl) never actually worked for me I had to abort the entire script but doing it now prevents videos loading/thumbnails swapping.
~I can't reproduce with Chrome or Firefox,~
maybe a/b testing stuff? or geo related? does this look the same for you https://gyazo.com/a75d57cbd33de5d00cd5db1d4b8a46b8 when you view page source?
Sorry, I misunderstood the issue, I can reproduce if I go to xhamster from a third-party site and then try to go back.
I get it when just typing the site in the address bar and pressing the back button. Like if i go to my new tab page then go to xhamster and press back the url changes to https://xhamster.com/#back_url.
Strangely enough typing xhamster into google search then clicking the site name and pressing back works like normal. Just not when you put it into your address bar then press back. Huh that is odd.
xhamster.com##+js(addEventListener-defuser.js, /^(?:hashchange|popstate)$/)
works but you have to click the back button twice.
what about
xhamster.com##+js(abort-on-property-read.js, initials.urls.backUrl)
That is better.
Yeah that works.
those filters are not working anymore.
a popunder after selecting a category
there's also another xhamster site with the same issues. xhamster.one.
:+1: thanks.
Popup when clicking on a video on mobile.
tsyndicate.com.popups are back looks like they decided to be cheeky trying to break the filter. it used to be wit-popunder now it's wil-popunder.
xhamster.*##+js(aopw, wil-popunder)
could you test if whitelisting last filter added here
xhamster.*#@#+js(acis, Math.random, popunder)
would provoke some other popup ?
(broken video: xhamster.com/xembed.php?video=12245144 )
With an empty cache, there's another popup, when right-clicking on a video from the front page.
This action also opens the video, instead of letting you use the right-click menu.
xhamster.*##script:contains(click) fixes the issue, but unfortunately, it also breaks some videos.
..so, a more advanced script injection rule is needed.
@mapx-:
Could you add these to 'uBlock filters - Legacy' too?:
xhamster.*##+js(abort-on-property-read.js, wig-popunder)
xhamster.*##+js(abort-on-property-write.js, wil-popunder)
xhamster.*##+js(addEventListener-defuser.js, pop)
You could just prepare PR for other such requests
Most helpful comment
what about
xhamster.com##+js(abort-on-property-read.js, initials.urls.backUrl)