Adblock Fingerprinting and testing

Adblocker detection
Adblock detected: false
Adblocker: No name detected
Adguard UUID leak: None detected

Content blocking detection
First-party blocking: No
First-party blocking (no-JS): Nodetected
Third-party blocking: No
HTML element hiding: No

Anti Adblock defuser detection
Redirects
Script redirect: None detected
Image redirect: None detected
Frame redirect (Firefox): None detected
XHR redirect: None detected
XHR fetch defuser test
XHR blocked without response: false
response.url does not match: false
response length is too short: false

What does the site do? It detect content blocker behavior (Adguard and uBlock Origin) on Chrome and Firefox which can be used for tracking and Adblock detection. Also the site can be used for testing defuser scriptlets.

What is the Adguard UUID leak? Every Browser extension has a unique identifier which getting generated with the install of a extension, the UUID. It can be used for browser Fingerprinting.

Chrome: The identifier for a specific addon is the same for every user but a site can detect Adguard as a addon.
Firefox: When a user installs a Addon a unique UUID getting generated for every user so its a very strong tracking parameter. The only way to change the UUID is a addon reinstall.

The UUID is hidden but with a small script the UUID can be leaked from the Adguard extension. With the UUID a site or tracking company can track the user around the web. The bug got reported to Adguard https://github.com/AdguardTeam/AdguardBrowserExtension/issues/2278

Direct link to the script: https://adblock-testing.glitch.me/script.js