A false positive is triggered by qooxdoo JavaScript framework (http://qooxdoo.org).
A qooxdoo desktop application, when built for debugging, pulls framework sources from server file by file. Ghostery erroneously blocks the file MBoxShadow.js, thus breaking the whole framework and rendering application unusable. The file is falsely recognized as "Adobe Test & Target" beacon by regex:
"2770": "\\/mbox(.*)?\\.js"
While it's pretty easy to manually unblock this particular bug, it takes hours to find the culprit.
See also:
http://qooxdoo.678.n2.nabble.com/Buil...
Help get this topic noticed by sharing it on
Twitter,
Facebook, or email.
Twitter,
Facebook, or email.
-
Hey TJ,
Thanks for using Ghostery!
Can you send me a URL example of where we can see the false positive? -
Loading Profile...




EMPLOYEE
