+# Partially case-sensetive and partially case-insensitive patterns are
+# possible, but the rules about splitting them up are extremely complex
+# - see the PCRE documentation for more information.
+#
+#############################################################################
+# Action Syntax
+#############################################################################
+#
+# There are 3 kinds of action:
+#
+# Boolean (e.g. "block"):
+# +name # enable
+# -name # disable
+#
+# Parameterized (e.g. "hide-user-agent"):
+# +name{param} # enable and set parameter to "param"
+# -name # disable
+#
+# Multi-value (e.g. "add-header", "send-wafer"):
+# +name{param} # enable and add parameter "param"
+# -name{param} # remove the parameter "param"
+# -name # disable totally
+#
+# The default (if you don't specify anything in this file) is not to take
+# any actions - i.e completely disabled, so Privoxy will just be a
+# normal, non-blocking, non-anonymizing proxy. You must specifically
+# enable the privacy and blocking features you need (although the
+# provided default actions file will do that for you).
+#
+# Later actions always override earlier ones. For multi-valued actions,
+# the actions are applied in the order they are specified.
+#
+#############################################################################
+# Valid actions are:
+#############################################################################
+#
+# +add-header{Name: value}
+# Adds the specified HTTP header, which is not checked for validity.
+# You may specify this many times to specify many headers.
+#
+# +block
+# Block this URL
+#
+# +deanimate-gifs{last}
+# +deanimate-gifs{first}
+# Deanimate all animated GIF images, i.e. reduce them to their last
+# frame. This will also shrink the images considerably. (In bytes,
+# not pixels!)
+# If the option "first" is given, the first frame of the animation
+# is used as the replacement. If "last" is given, the last frame of
+# the animation is used instead, which propably makes more sense for
+# most banner animations, but also has the risk of not showing the
+# entire last frame (if it is only a delta to an earlier frame).
+#
+# +downgrade-http-version
+# Downgrade HTTP/1.1 client requests to HTTP/1.0 and downgrade the
+# responses as well. Use this action for servers that use HTTP/1.1
+# protocol features that Privoxy currently can't handle yet.
+#
+# +fast-redirects
+# Many sites, like yahoo.com, don't just link to other sites.
+# Instead, they will link to some script on their own server,
+# giving the destination as a parameter, which will then redirect
+# you to the final target.
+#
+# URLs resulting from this scheme typically look like:
+# http://some.place/some_script?http://some.where-else
+#
+# Sometimes, there are even multiple consecutive redirects encoded
+# in the URL. These redirections via scripts make your web browing
+# more traceable, since the server from which you follow such a link
+# can see where you go to. Apart from that, valuable bandwidth and
+# time is wasted, while your browser aks the server for one redirect
+# after the other. Plus, it feeds the advertisers.
+#
+# The +fast-redirects option enables interception of these requests
+# by Privoxy, who will cut off all but the last valid URL in the
+# request and send a local redirect back to your browser without
+# contacting the intermediate sites.
+#
+# +filter{name}
+# Filter the website through one or more regular expression filters.
+# Repeat for multiple filters.
+#
+# Filters predefined in the supplied re_filterfile include:
+#
+# html-annoyances: Get rid of particularly annoying HTML abuse
+# js-annoyances: Get rid of particularly annoying JavaScript abuse
+# content-cookies: Kill cookies that come in the HTML or JS content
+# popups: Kill all popups in JS and HTML
+# frameset-borders: Give frames a border
+# webbugs: Squish WebBugs (1x1 invisible GIFs used for user tracking)
+# refresh-tags: Kill automatic refresh tags (for dial-on-demand setups)
+# fun: Text replacements for subversive browsing fun!
+# nimda: Remove Nimda (virus) code.
+# banners-by-size: Kill banners by size (very efficient!)
+# shockwave-flash: Kill embedded Shockwave Flash objects
+# crude-parental: Kill all web pages that contain the words "sex" or "warez"
+#
+#
+# +hide-forwarded-for-headers
+# Block any existing X-Forwarded-for header, and do not add a new one.
+#
+# +hide-from-header{block}
+# +hide-from-header{spam@sittingduck.xqq}
+# If the browser sends a "From:" header containing your e-mail address,
+# either completely removes the header ("block"), or change it to the
+# specified e-mail address.
+#
+# +hide-referer{block}
+# +hide-referer{forge}
+# +hide-referer{http://nowhere.com}
+# Don't send the "Referer:" (sic) header to the web site. You can
+# block it, forge a URL to the same server as the request (which is
+# preferred because some sites will not send images otherwise) or
+# set it to a constant string.
+#
+# +hide-referrer{...}
+# Alternative spelling of +hide-referer. Has the same parameters,
+# and can be freely mixed with, "+hide-referer". ("referrer" is the
+# correct English spelling, however the HTTP specification has a
+# bug - it requires it to be spelt "referer").
+#
+# +hide-user-agent{browser-type}
+# Change the "User-Agent:" header so web servers can't tell your
+# browser type. (Breaks many web sites). Specify the user-agent
+# value you want - e.g., to pretend to be using Netscape on Linux:
+# +hide-user-agent{Mozilla (X11; I; Linux 2.0.32 i586)}
+# Or to identify yourself explicitly as a Privoxy user:
+# +hide-user-agent{Privoxy/1.0}
+# (Don't change the version number from 1.0 - after all, why tell them?)
+#
+# +handle-as-image
+# Treat this URL as an image. This only matters if it's also "+block"ed,
+# in which case a "blocked" image can be sent rather than a HTML page.
+# See +set-image-blocker{} for the control over what is actually sent.
+#
+# +set-image-blocker{blank}
+# +set-image-blocker{pattern}
+# +set-image-blocker{<URL>} with <url> being any valid image URL
+# Decides what to do with URLs that end up tagged with {+block +handle-as-image}.
+# There are 4 options:
+# * "-set-image-blocker" will send a HTML "blocked" page, usually
+# resulting in a "broken image" icon.
+# * "+set-image-blocker{blank}" will send a 1x1 transparent image
+# * "+set-image-blocker{pattern}" will send a 4x4 grey/white pattern
+# which is less intrusive than the logo but easier to recognize
+# than the transparent one.
+# * "+set-image-blocker{<URL>}" will send a HTTP temporary redirect
+# to the specified image URL.
+#
+#
+# +limit-connect{portlist}
+# The CONNECT methods exists in HTTP to allow access to secure websites
+# (https:// URLs) through proxies. It works very simply: The proxy
+# connects to the server on the specified port, and then short-circuits
+# its connections to the cliant and to the remote proxy.
+# This can be a big security hole, since CONNECT-enabled proxies can
+# be abused as TCP relays very easily.
+# By default, i.e. in the absence of a +limit-connect action, Privoxy
+# will only allow CONNECT requests to port 443, which is the standard port
+# for https.
+# If you want to allow CONNECT for more ports than that, or want to forbid
+# CONNECT altogether, you can specify a comma separated list of ports and port
+# ranges (the latter using dashes, with the minimum defaulting to 0 and max to 65K):
+#
+# +limit-connect{443} # This is the default and need no be specified.
+# +limit-connect{80,443} # Ports 80 and 443 are OK.
+# +limit-connect{-3, 7, 20-100, 500-} # Port less than 3, 7, 20 to 100, and above 500 are OK.
+#
+# +prevent-compression
+# Prevent the website from compressing the data. Some websites do
+# that, which is a problem for Privoxy, since +filter, +kill-popups
+# and +gif-deanimate will not work on compressed data. Will slow down
+# connections to those websites, though.
+#
+# +prevent-keeping-cookies
+# +session-cookies-only
+# If the website sets cookies, make sure they are erased when you exit
+# and restart your web browser. This makes profiling cookies useless,
+# but won't break sites which require cookies so that you can log in
+# or for transactions.
+#
+# +crunch-outgoing-cookies
+# Prevent the website from reading cookies
+#
+# +crunch-incoming-cookies
+# Prevent the website from setting cookies
+#
+# +kill-popups
+# Filter the website through a built-in filter to disable
+# 1;''.concat() etc. The two alternative spellings are
+# equivalent.
+#
+# +send-vanilla-wafer
+# This action only applies if you are using a jarfile. It sends a
+# cookie to every site stating that you do not accept any copyright
+# on cookies sent to you, and asking them not to track you. Of
+# course, this is a (relatively) unique header they could use to
+# track you.
+#
+# +send-wafer{name=value}
+# This allows you to add an arbitrary cookie. Specify it multiple
+# times in order to add several cookies.
+#
+#############################################################################
+
+#############################################################################
+# Settings -- Don't change.
+#############################################################################
+{{settings}}
+#############################################################################
+for-privoxy-version=3.0
+
+#############################################################################
+# Aliases