d2juccxzu13rax.cloudfront.net seems to be used as a fallback for d2ers4gi7coxau.cloudfront.net
Add some new ad domains - nothing particularly interesting in whois for any of these
Create a script to fetch and maintain whitelist entries for jira-projects/ADBLK#4
Amend bin/build_lists to support building an allowlist (jira-projects/ADBLK#4)
Have the pre-commit ensure that hooks are up to date (the only thing it won't be able to affect is itself)
Have commit hooks rebuild and publish the lists for jira-projects/ADBLK#1
Update script to install/publish the generated lists for jira-projects/ADBLK#1
As of jira-projects/ADBLK#1 social media trackers will no longer be accounted for in seperate blocklists.
Create hook to update hooks after git-pull in preparation for jira-projects/ADBLK#1
Change block of img1.wsimg.com to be for path {{/tcc}} rather than domain wide, for ADBLK-28 / #3
Block known phishing site and the endpoint it attempts to submit creds to.
We've added some code duplication in ADBLK-27 so move it to a function and make it DRY
Pull down the Adguard CNAME tracker domains and process them into the blocked domain list for ADBLK-27
ADBLK-25 Block domains associated with the CatapultTools Anti-Adblock Setup
ADBLK-24 Block Barclays analytics/metrics domains - it causes login page hangs
Block phising domain - observed in SMS mesdages trying to get user to enter creds at https://halifx-online.logon17.co.uk
Xiaomi seem to have started referencing an AWS ELB directly instead of using the domain they previously used. Block it
Add phishing domain - being used in phishing texts trying to get EE creds
Block the whiteops fingerprinting collection domains referenced here - https://smitop.com/post/reddit-whiteops/
Whitelist s.yimg when referenced from tw.mobi.yahoo.com
Implement ability to add specific whitelisting lines
Block ettoday ad domain for ADBLK-23
Block some specific Google Ad domains for ADBLK-23
Block Xiaomi's ELB
Block www.newzit.com/setABframe*
oops, remove the scheme
Block facebook tracker path
ADBLK-22 block fr.app.global.xiaomi.net and whatever variations they come up with for the third-level domain
Regex their Sesnsordata ones too
ADBLK-19 Add a new regex to handle Xiaomi's "resolver" service - knew there'd be another label appear at some point. This time it's "global" - {{resolver.msg.global.xiaomi.net}}
ADBLK-19 Use regex functionality to block some Xiaomi tracking domains
Update file header
Remove defunct link
ADBLK-21 Update index page to include Pihole information
ADBLK-21 add script to pull down and consume the regex list
ADBLK-21 Expose a Regex list to be consumed by PiHole
ADBLK-19 some of the region specific Miui tracking domains
Move domain to correct file
ADBLK-19 Block the zones ad.[locations] for Xiaomi
ADBLK-20 Update build_abp to use the new block files
ADBLK-20 Remove errant semicolon and add a do
Move old blockfile out of the way (keeping so that can still git blame to see when/why a domain was added)
ADBLK-20 Split manualblocks out into seperate files so that individual companies can be spotted/updated easily
ADBLK-19 Upstream list seems to be missing the russian endpoint. See https://twitter.com/craiu/status/1256508158161367040
ADBLK-19 Consume the excellent Xiaomi domain list - https://gist.githubusercontent.com/unknownFalleN/3f38e2daa8a98caff1b0d965c2b89b25/raw - when building lists
ADBLK-19 Block some more Xiaomi domains
ADBLK-19 Block Xiaomi's SensorData domain
Make the domain wide ones just specify domain
ADBLK-18 Create a pihole compatible list with the social media domains re-inserted
Add link to new list
Oops, give him his tag back
ADBLK-18 Move social media trackers into new config file - social_media_trackers.txt
ADBLK-18 Adjust deployment script to seperate social media trackers out (they'll need moving to a different config file)
guce.advertising.com is used to try and inject 1st party tracking cookies rather than being a 3rd party
Reblock the Admiral Anti-block domains
Treating these as zones breaks pihole's regex matches. Needs to be added as an explicit block instead
Update the Admiral lists
pubexchange are a paid advertising network
ADBLK-17 block *.getadmiral.com
ADBLK-17 Block a new admiral anti-adblock domain
ADBLK-16 Block push notifier pushassist.com
Block MOL Anti-Adblock script
Block some Piano.io related tracker domains. ADBLK-15
Block Ecosia's analytics (identified in MISC-35)
Analytics used by webbroadcast
ADBLK-14 Block zone amobee.com
ADBLK-14 Block DDMR.com
Although the zone is blocked, lets be literal and block the exact label too. pnldsk.adclarity.com also comes under ADBLK-14
ADBLK-14 Block list of domains know to be data ingest points for the extensions involved in DataSpii
Blocking 2 domains tied up in DataSpii.
Block another 2o7 domain - used by Archant for the EADT - archanteadt.112.2o7.net
ADBLK-13 Block Grapeshot related domains
ADBLK-12 Generate a plaintext list of blocked zones - push into output file blockedzones.txt
ADBLK-10 Block auto.search.msn.com and 2mdn.net
Move AMP Project from manualblock to manualpages.
ADBLK-9 Block a couple of endpoints the Google News makes XHR requests to when it believes the client is an Android phone.
Publish v1.4.3 of the anti-amp script
Forgot to link to blockeddomains from the homepage
To be honest, if you're reading The Sun you've already got bigger problems than ads, but block them all the same
sdad.guru seems to be used to collect metrics from various sites including
Block the Bing RewardsApp activity tracker - most people aren't using Bing Rewards
ADBLK-8 Adding example script for pulling zones (only) into unbound
ADBLK-8 Create unbound format file containing only manually blocked zones
NOOP, whitespace tweaks to make it more readable (didn't help much...)
Oops, wrong file
ADBLK-3 Explicitly block the CNAME targets too, again for pi-hole's benefit
ADBLK-3 Explicitly include swa.and.co.uk in the manualblock so that it makes it into pi-hole (pity Gravity lists can't be wildcarded)
Block Dailymail / DMG analytics domains
Block swa.metro.co.uk
ADBLK-6 Block the Pushly distribution zone p-n.io
ADBLK-5 Block dmgmediaprivacy.co.uk
ADBLK-4 block a bunch of userreport tracking domains
Block *.and.co.uk - see ADBLK-3
ADBLK-2 Block HMRCMECLAIM.com
npttech don't have any content on their base domain, and appear to serve up anti-adblock scripts (e.g. https://www.npttech.com/advertising.js)
Add a copy of the alpha release v1.4.1a - https://github.com/bentasker/RemoveAMP/releases/tag/v1.4.1a
Add v1.4 of the anti-AMP script
Block a Miui tracking domain
Create a list of domains for simple inclusion into pihole
Adding a reference download script
Remove quad A from redirects, unbound doesn't like them
Reduce the risk of duplicates when building autolist.txt
These are used for GDPR consent banners.
ADBLK-1 Block another Admiral domain - forecasttiger.com
ADBLK-1 Block another Admiral Anti-Adblock domain
Block zone aaxads.com
Another Admiral domain (ADBLK-1)
Rumble.com claims to "MANAGE YOUR PROFESSIONAL, SOCIAL AND VIRAL VIDEOS ON RUMBLE"
Add some more "taken down" domains.
Add some more admiral domains. See ADBLK-1
Tbh, I'm amazed googletagmanager wasn't already in any of the automated upstream sources the lists are built from.
Spot.IM bills itself as a way to
Hoze a bumch of their other domains too.
Another Admiral anti-adblock domain
Blocking *.unequalbrake.com
Untrustworthy domain used by GoDaddy to quietly inject JS into their customer's hosted content for purposes of user tracking.
Looks like 1337x.to have a new domain, block their ad code there.
Despite the misleading domain name, seems to be used to serve ad code.
runmewival is used for Tag style tracking.
Block twitter widgets.
Merge branch 'master' of https://github.com/bentasker/adblocklists
Received email to say that player.h-cdn.com was added erroneously.
Block the annoying banner on Washington Post
Actually, block the lot
Block anti-adblocker
All get called when using Freshdesk/Freshservice. Not needed (and man that's a lot of analytics products they're using), so blocking. Service performs a lot faster in Firefox afterwards.
Add some qq.com subdomains and the entirety of moatads
Just reviewing some of the domains already in the list, and found a new resource being loaded. Block that too
Remove some redundant rules (as they're covered by a wildcard that was added later) and support for additional domains
Blocking browser-update script.
Update index to include link to WebUSB greasemonkey script
Add anti WebUSB greasemonkey script.
Adjust to respond specifically to request device. We still override navigator.bluetooth as well though
Update to match all
Fix typo
Block entire google-analytics zone.
Add link back to repo
Update config file paths
Fix download and updateurls following the rename
Update greasemonkey links on homepage
Change filename extensions so that tamper/greasemonkey can automatically recognise them
Add a README
ABP builder should pull in the latest lists
Revert "Cronjob should pull down any list updates"
Cronjob should pull down any list updates
Add the index page
Add the utility scripts
Add the manually controlled lists of domains to block.
Forgot I even had these. Track some greasemonkey scripts used to help block ads/tracking
The anti-amp scripts (from MISC-25) are served from the same dir, so add them
Ignore the fetched and generated lists