There's been an increase in the number of domains using CNAMEs to try and mask tracking - essentially allowing trackers to masquerade as 1st party rather than 3rd party sites.
Adguard have released a list of underlying CNAMEs -
https://github.com/AdguardTeam/cname-trackers/tree/master/trackers - however they're not in a particularly convenient format so will need some processing for inclusion.
They're of (relatively) limited use in browser-based adblocker extensions (only those that use
dns.resolve or similar will see the CNAME target to block it), but are of use in Pihole and various other DNS based solutions.
Activity
2021-03-05 09:54:23
in order to extract the domains.
It'd also mean that if the ad companies managed to pull some DMCA nonsense and temporarily got the repo removed we'd still have a copy of the lists to use.
2021-03-05 11:15:21
Webhook User-Agent
View Commit
2021-03-05 11:15:22
Webhook User-Agent
View Commit
2021-03-05 13:19:03
2021-03-05 13:19:03
2021-03-05 13:19:06