AdAway / adaway.github.io

https://adaway.org
Other
256 stars 94 forks source link

I would like to offer my hosts file to be added to the host sources #23

Closed DataMaster-2501 closed 4 years ago

DataMaster-2501 commented 4 years ago

I would like to offer my hosts file to be added to the host sources. I have been working on this list for many many years and from Sep 12, 2017 I've been sharing it with all of the net.

DataMaster-Android-AdBlock-Hosts

PerfectSlayer commented 4 years ago

Hello @DataMaster-2501

I moved your issue to the right repository. Everything about hosts management is discussed here. Currently @jawz101 and @smed79 are taking over the hosts file. Maybe there is some opportunity for you to work together?

Otherwise, your list could also be added in the optional sources for AdAway. "Optional" because I read in your README it can block video on news website. We risk to have an issue storm if we enable this by default 😅

jawz101 commented 4 years ago

I've actually tried that DataMaster list on my pfSense box and it is pretty aggressive. The current Adaway is 410 entries, my submitted revision sits around 12,800, and the DataMaster List sits around 165450 x2- one ipv4 one ipv6.

Just skimming over the list, it's pretty arbitrary. If there is an ad or tracker you don't need to block every domain that belongs to that company.

This is like that company's corporate website, blog, help links, corporate mail servers, developer documentation links, etc. I actually want to visit some of those links to research the company. That doesn't mean my phone tries to hit every one of those thru an ad library. There are also blocks for every Kaspersky domain- I don't even consider Kaspersky an ad or a tracker.

Ideally I'd like to trim it to a few thousand of ads and trackers that mobile apps communicate with. Not browser web page ads (web adblockers can block those), not trackers from a Windows computer.. just Android sdk ad networks. I figure that would realistically be maybe 4,000 or around there.

0.0.0.0       kiip.me
0.0.0.0       www.kiip.me
0.0.0.0       help.kiip.me
0.0.0.0       blog.engineering.kiip.me
0.0.0.0       engineering.kiip.me
0.0.0.0       campaigns.kiip.me
0.0.0.0       docs.kiip.me
0.0.0.0       blog.kiip.me
0.0.0.0       email.kiip.me
0.0.0.0       app.kiip.me
0.0.0.0       api.kiip.me
0.0.0.0       chat.kiip.me
0.0.0.0       events.kiip.me
0.0.0.0       home.kiip.me
0.0.0.0       my.kiip.me
0.0.0.0       staging49.kiip.me
0.0.0.0       jobs.kiip.me
0.0.0.0       v4.kiip.me
0.0.0.0       webdemo.kiip.me
0.0.0.0       info.kiip.me
0.0.0.0       d3aq14vri881or.kiip.me
0.0.0.0       exchange-us-east.kiip.me
0.0.0.0       sftp.kiip.me
0.0.0.0       vpn.kiip.me
0.0.0.0       table.kiip.me
0.0.0.0       bi.kiip.me
0.0.0.0       blog.developers.kiip.me
0.0.0.0       developers.kiip.me
0.0.0.0       stream.kiip.me
0.0.0.0       amoj4vqkbyal.kiip.me
0.0.0.0       o1.email.kiip.me
PerfectSlayer commented 4 years ago

Agreed, 165450 is pretty huge.

If there is an ad or tracker you don't need to block every domain that belongs to that company.

Yup, otherwise there will be a lot of angry users 😅

DataMaster-2501 commented 4 years ago

then I withdraw my request.

PerfectSlayer commented 4 years ago

I hope we did not scare you with our reviews.

Regards

DataMaster-2501 commented 4 years ago

No you did not "scare me away" I can just see that you people don't understand why my list is made this way. As for jawz101 he needs to take the time & read over my README.md & then maybe if he can read he will understand why. 🙄😒 As for Kaspersky-> https://github.com/DataMaster-2501/DataMaster-Android-AdBlock-Hosts/issues/2

jawz101 commented 4 years ago

I've read it and it doesn't make sense to block every subdomain for a company when their actual service only communicates via a certain set of subdomains. If you want to research the company you're blocked. That's excessive.

As for Kaspersky, I've administered KES Endpoint Security myself and I found it to be the most thoroughly impressive software I've ever administered. I don't buy the drama. The U.S. threw Eugene under the bus and many security professionals agree. The only rationale that makes sense is yes, it's probably best to use U.S. security software on U.S. government networks. But going off of the reports of Israeli cybersecurity who got their information by hacking Kaspersky themselves is a bit shady. The KSN feature is like any other cloud-connected AV technology and Kaspersky just had that opt-in feature before most other AV products did. When you opt to contribute and benefit from cloud protection, any unknown file may be submitted if it follows suspicious behavior. If the U.S. gov'ts own cybersecurity offices design rootkits and name them things like exploit.exe and the app behaves maliciously, subversively, or aggressively- how the heck do you think an AV product is going to react to it?

That's just my thoughts on it and you can disagree.

DataMaster-2501 commented 4 years ago

" I've administered KES Endpoint Security myself and I found it to be the most thoroughly impressive software I've ever administered."

Shows what you know LOL!

kekmacska commented 6 months ago

I've read it and it doesn't make sense to block every subdomain for a company when their actual service only communicates via a certain set of subdomains. If you want to research the company you're blocked. That's excessive.

As for Kaspersky, I've administered KES Endpoint Security myself and I found it to be the most thoroughly impressive software I've ever administered. I don't buy the drama. The U.S. threw Eugene under the bus and many security professionals agree. The only rationale that makes sense is yes, it's probably best to use U.S. security software on U.S. government networks. But going off of the reports of Israeli cybersecurity who got their information by hacking Kaspersky themselves is a bit shady. The KSN feature is like any other cloud-connected AV technology and Kaspersky just had that opt-in feature before most other AV products did. When you opt to contribute and benefit from cloud protection, any unknown file may be submitted if it follows suspicious behavior. If the U.S. gov'ts own cybersecurity offices design rootkits and name them things like exploit.exe and the app behaves maliciously, subversively, or aggressively- how the heck do you think an AV product is going to react to it?

That's just my thoughts on it and you can disagree.

Kaspersky is a russian goverment spyware. It is connected to FSB, russian intelligence agency

https://en.m.wikipedia.org/wiki/Kaspersky_bans_and_allegations_of_Russian_government_ties. (See references)

https://www.extremetech.com/defense/252421-russian-cybersecurity-firm-kaspersky-lab-awfully-tight-russian-fsb

spirillen commented 6 months ago

@kekmacska

This post is ⛏️ 4 years old and your comment isn't relevant. Conspiracy 👽 theories are best suited for other forums.

Well, you can just read their privacy, then you'll classify Kaspersky, McAfee and Norton under spyware and malicious :smirk: