Edit: Replies to this thread indicate this is not fully correct as it exists on all browsers; and is likely an ad thing.

  • Superb@lemmy.blahaj.zone
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 year ago

    If the person who tweeted this scrolled down in the hackernews thread, they’d see this code was misinterpreted. It’s part of an anti Adblock script that runs 5s after page load. Still shitty, but less insidious

  • HeChomk@lemmy.world
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 year ago

    Don’t use the youtube website. On any browser. Use freetube instead, if your situation and use case allows it. No Google bullshit required. Loads fast, no ads, no tracking. Fully self contained.

    • Virkkunen@kbin.social
      link
      fedilink
      arrow-up
      1
      ·
      1 year ago

      I really appreciate you saying “if your situation and use case allows it”. I’m sick of people “suggesting” these kind of things by just saying “don’t do this” “stop doing that” while completely ignoring that not everyone has the same use cases, preferences and possibilities for such.

  • Echo Dot@feddit.uk
    link
    fedilink
    arrow-up
    1
    ·
    1 year ago

    Whoever posted this is not a programmer. Does no conditional on that code so it would run on every browser on every session so where’s the check for Firefox?

    Unless they are claiming that it is injected at runtime. But that’s easily provable/disprovable with agent spoofing.

  • Boomkop3@reddthat.com
    link
    fedilink
    arrow-up
    1
    ·
    1 year ago

    It would not be the first time Google was caught doing this. A couple years ago they were caught breaking apps like google maps if your user agent string wasnt chrome.

    But recently I’ve noticed they can tell regardless of that string. So my guess is that they’ve hidden fingerprinting code in the chrome browser