cname-cloaking-blocklist

A list of domains used by tracking companies as CNAME destination when disguising third-party trackers as first-party trackers. (by nextdns)

Cname-cloaking-blocklist Alternatives

Similar projects and alternatives to cname-cloaking-blocklist

NOTE: The number of mentions on this list indicates mentions on common posts plus user suggested alternatives. Hence, a higher number means a better cname-cloaking-blocklist alternative or higher similarity.

cname-cloaking-blocklist reviews and mentions

Posts with mentions or reviews of cname-cloaking-blocklist. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-01-28.
  • Disguised trackers are blocked regardless of toggle (which is a good thing)
    3 projects | /r/nextdns | 28 Jan 2023
    So nextdns’s third party disguised trackers is actually really tiny of a list, like 30 domains. (Im trying to add more so it has the same amount of cname’s blocked as adguard). Anyways, the reason why the list is so tiny is because it uses wildcard logic so all subdomains get blocked. It already uses some of the cname companies that adguards cname-tracker list uses but not all. Hopefully my pull request can get merge eventually because then the setting will be a little bit more effective
  • New Adguard CNAME Tracker List that works on Pi-hole!
    3 projects | /r/pihole | 9 Mar 2021
    We've been discussing this new list source on another forum. As stated by some other users, a lot of the entries are already included in other lists, even that isn't very efficient. A long time ago, NextDNS published something similar on GitHub, after looking into that, I created and published a script that turned these entries into regex blacklist entries, which provide adequate protection against CNAME cloaking. Now the Adguard Team has published their version, however, using a similar technique to create regex blacklist entries also provides adequate protection, without adding thousands of new (some duplicate) entries to gravity. The file of interest in the entire repository is the json file, it contains the domains that would require regexes to efficiently block everything in the lists. When adding the regex entries, using a script, it turned out most of them are already covered by the NextDNS entries, only 9 additional regexes are added. For those who are interested in using the regex blacklist method, as opposed to adding big lists, you can find the entire explanation (and how to) in my pihole manual, section 15 (Deep CNAME inspection). the domain users.telenet.be may require whitelisting!

Stats

Basic cname-cloaking-blocklist repo stats
3
136
0.0
about 1 year ago

Sponsored
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com