If you put UC into a debugger, you see a function with a very telling name "blocklist" pointing on a code with strings containing some github urls and, surprise, some defunct urls at microsoft.com and adsense cdn.
It's 2019, and people still keep forgetting stripping debug symbols.
Doesn't Chrome and Firefox do the same for known malicious websites? IIRC they use hashes and / or a local database of hashes, but I can't be sure. Pretty sure that caused major controversy in its earlier days too.
Is it common for them to filter at the browser level?