Disclaimer Adguard for Mac is not an open-source project. We use GitHub as an open bug tracker for users to see what developers are working on.
In this release, we’ve made AdGuard more helpful when you need clarity, and stronger when you need security. Interactive blocking pages and post-quantum encryption — it’s a win-win.
Blocking pages: now interactive
Chances are, you’ve seen one of our blocking screens before — whether due to a phishing threat or a filtering rule. Previously, these pages were more like roadblocks. Now they’re more like intersections where you have options.
For example, if AdGuard blocks a website due to phishing suspicion, but you’re sure it’s safe, you can let us know directly from the blocked page. You can also access our security check tool to get more details about the website.
A website blocked by a filtering rule? Just click “Add this website to the allowlist” and an unblocking rule will be generated automatically and added to User rules.
Post-quantum cryptography
When it comes to HTTPS filtering, it’s crucial that AdGuard encrypts your traffic just as securely as the app it’s filtering. That’s why we always stay up to date and keep pace with modern apps and browsers.
This time, we’ve added support for post-quantum cryptography. If the filtered app or browser uses the latest encryption methods, AdGuard will do the same, ensuring that even a quantum computer won’t be able to decrypt your traffic.
Changelog
Improvements
- Added the confirmation window after pressing Reset #1532
Fixes
- AdGuard icon in the Dock is still active after closing the certificate info in AdGuard Assistant #1533
- After updating or importing settings, the filters with empty metadata have empty titles #1550
- Network extension consumes more than 100% CPU on v2.17.0.1955 nightly #1560
CoreLibs (Filtering engine)
- CoreLibs updated to v1.17.135 #1562
Improvements
- Removed trust in GlobalTrust certificates #1883
- Enable post-quantum cryptography when it’s used by the filtered app #1916
- Implemented new blocking pages #1859
- Provided the ability to add userscripts without specifying a resource #1889
- Added safe search for
so.com
into Parental Control #1942 - Allowed HTTPS filtering with trusted self-signed certs #1890
Fixes
- “##+js(rmnt, #text, [...])” rule with non-ASCII UTF-8 characters is not converted #1946
- Error in content-script when
$jsinject
exception is applied #1960 $network,app=
rules with a large number of apps don’t work #1951- The “Proceed anyway” button doesn’t work when a website is blocked by a rule with the
$all
modifier #1952 - Content script is not injected on
www.huya.com
#1897 - On certain websites, media playback is broken #1944
- Network filtering service does not start correctly #1462
- CoreLibs v1.17 blocks access to
ota.googlezip.net
#1963 - Access to function “GM_getValue” is not allowed #1905
- Upload speed is low #1943
- On
reddit.com
, URL parameters with%24
are not removed #1922
DnsLibs (DNS filtering engine)
- DnsLibs updated to v2.6.0 #1558
Improvements
- Added a public method for detecting upstream protocol #209
Fixes
_matter._tcp.default.service.arpa
request is not resolved locally #230
Scriptlets (JavaScript enhancement for filtering rules) updated to v2.1.7
Improvements
prevent-addEventListener
— added ability to match specific element #480trusted-click-element
— check forcontainsText
of all matched selectors #468- Added new scriptlet
prevent-canvas
#451 href-sanitizer
— added ability to modify the value #460href-sanitizer
— added base64 support #455prevent-fetch
— setresponse.ok
tofalse
ifresponse.type
isopaque
#441prevent-xhr
— added missed events #414prevent-xhr
— modifiedresponse
#415remove-node-text
— added an ability to remove text node of specified element #397set-cookie
andset-local-storage-item
— added valuesforbidden
andforever
#458trusted-replace-node-text
— addedtrusted-types
policy #457
Fixes
json-prune
— content of array was incorrectly removed #482trusted-click-element
— element was removed and added again before it was clicked #391trusted-create-element
— element is added on every DOM change #450trusted-set-cookie
— cannot set cookie if name has__Secure-
prefix #448- Tests failing for
trusted-set-cookie
#453