Is anyone else getting this ad? If you get it and decide to check what it is about - please share the results with the rest of us. To me it seems like a scam, but I don't want to click on it just to find out for sure. It is a constantly blinking ad, so it should be easy to spot.
Seems like... I tried a few times but that "ad" doesn't appear in the rotation. Is it on desktop or mobile? I think Friedman needs the link of the ad to be able to report it. This could be done by doing a right-click on it, then "copy link address" or sth like that. You could also send the "page source" (usually right-click on any spot of the page, then "view page source") or extract the link from the "inspect" page.
I'm on desktop. Code: <div class="chyoa-adzone chyoa-adzone-1"> <div class="chyoa-banner" style="width: 728px; height: 90px;"> <script type="text/javascript"> var ad_idzone = "2258201", ad_width = "728", ad_height = "90"; </script> <script type="text/javascript" src="https://ads.exosrv.com/ads.js"></script> <script type="text/javascript"> ExoLoader.getDetector().domain_base = "exosrv.com"; ExoLoader.addZone({"type": "banner", "width":"728", "height":"90", "idzone":"2258201"}); </script> <noscript><a href="https://main.exosrv.com/img-click.php?idzone=2258201" target="_blank"><img src="https://syndication.exosrv.com/ads-iframe-display.php?idzone=2258201&output=img&type=728x90" width="728" height="90"></a></noscript> <div class="chyoa-adblock-message"><div class="vertical-alignment-wrapper"><div class="vertical-alignment">Want to support CHYOA?<br />Disable your Ad Blocker! Thanks :)</div></div></div> </div> <div class="chyoa-adzone__footer" style="width: 728px;"> <a href="https://www.patreon.com/CHYOA" target="_blank" rel="nofollow" class="chyoa-adzone__remove-ads-link">Remove Ads</a> </div> I believe this is the ad-relevant info (when the ad is at the top of the page. I already sent a message to Friedman on the main site about another instance of the ad, when the ad was at the bottom.
Hm... it seems the ads get loaded later... I get the link by copying directly or through the "Inspect" console. it looks like Code: https://main.exosrv.com/click.php?data=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