Use the amazing StevenBlack/hosts Adblock Lists with dnsmasqd or unbound on your router
To grab the latest list (default: adware + malware + fakenews) run the update.sh
script
Example
$ ./update.sh
--2017-02-18 09:09:57-- https://raw.githubusercontent.com/StevenBlack/hosts/master/alternates/fakenews/hosts
Resolving raw.githubusercontent.com (raw.githubusercontent.com)... 151.101.112.133
Connecting to raw.githubusercontent.com (raw.githubusercontent.com)|151.101.112.133|:443... connected.
HTTP request sent, awaiting response... 200 OK
Length: 1021501 (998K) [text/plain]
Saving to: ‘hosts.txt’
2017-02-18 09:09:58 (2.38 MB/s) - ‘hosts.txt’ saved [1021501/1021501]
44006 Entries processed..
5 Whitelist Hosts processed..
10493 Domains total..
1. Copy the dist/dnsmasq.adblock.conf
file to a persistent location (e.g. /etc
or /jffs/etc
on WRT Routers)
2. Add the following directive to your dnsmasq.conf file
conf-file=/etc/dnsmasq.adblock.conf
3. Restart dnsmasq
4. You're Ready!
1. Copy the dist/unbound.adblock.conf
file to a persistent location (e.g. /etc
or /jffs/etc
on WRT Routers)
2. Add the following directive to your unbound.conf file into server
section
server:
...
include: /etc/unbound.adblock.conf
3. Restart unbound
4. You're Ready!
Add a bunch of hostnames which should not getting blocked. Wildcards are supported using leading dot
Example
analytics.google.com
.twitter.com
mydommain.tld
.mywildcarddomain.tld
The Script is OpenSource and licensed under the Terms of The MIT License (X11) - your're welcome to contribute