Remix.run Logo
soared 20 hours ago

It’s not in chrome web browser, just the google app. So you can’t run scripts/etc afaik

pushcx 19 hours ago | parent [-]

Yeah. It's fairly likely the ads link to a URL with a recognizable pattern. Failing that, if an ad is reproducible we can iterate with a site owner to detect the DOM modification a few different ways. I've drafted a blog post to collaborate with others on reverse engineering this: https://push.cx/google-ad-injection

rafram 19 hours ago | parent [-]

Website owners can simply opt out: https://docs.google.com/forms/d/1h9I0TbN-H_1e85CqXYb1ng7rQfg...

eek2121 19 hours ago | parent [-]

Phishing Exercise #16,777,216 -- THIS TIME IT WILL VALIDATE. YES.

rafram 19 hours ago | parent [-]

The link was in the article. I agree that it’s hardly a great way to create an opt-out system.