Skip to content

GitLab

  • Projects
  • Groups
  • Snippets
  • Help
    • Loading...
  • Help
    • Help
    • Support
    • Community forum
    • Submit feedback
    • Contribute to GitLab
  • Sign in
Content
Content
  • Project overview
    • Project overview
    • Details
    • Activity
    • Releases
  • Repository
    • Repository
    • Files
    • Commits
    • Branches
    • Tags
    • Contributors
    • Graph
    • Compare
  • Issues 299
    • Issues 299
    • List
    • Boards
    • Labels
    • Service Desk
    • Milestones
  • Merge Requests 0
    • Merge Requests 0
  • Analytics
    • Analytics
    • Repository
    • Value Stream
  • Wiki
    • Wiki
  • Members
    • Members
  • Collapse sidebar
  • Activity
  • Graph
  • Create a new issue
  • Commits
  • Issue Boards
  • Better
  • ContentContent
  • Issues
  • #681

Closed
Open
Opened Dec 26, 2017 by Nikita@nkukushkin
  • Report abuse
  • New issue
Report abuse New issue

Block ads injected by Beeline router

Beeline is one of the largest Russian telecom providers.

They supply their own routers, which, apparently, inject ads into all non-https websites. Here are screenshots with my findings (I will only prove one site as example, but it happens on all non-https sites): Screen_Shot_2017-12-26_at_16.08.48 Screen_Shot_2017-12-26_at_16.08.33 Screen_Shot_2017-12-26_at_16.08.22

I called their support and they couldn't explain the existence of this script, however they could disable it ¯_(ツ)_/¯

This one is tricky now, because you need this router to reproduce this, and mine was "fixed". However, consider if it's possible for you to block this kind of behaviour. I'm pretty sure there are many public Beeline routers that do this, as well as routers of many non-suspecting customers of Beeline.

Assignee
Assign to
None
Milestone
None
Assign milestone
Time tracking
None
Due date
None
1
Labels
trackers
Assign labels
  • View project labels
Reference: better/content#681

Like this? Fund us! Your patronage helps keep us independent and going.