[](https://github.com/yokoffing/NextDNS-Config/issues)      [](https://hits.seeyoufarm.com) *** # Guidelines :bookmark: 1) Prevent overblocking by utilizing the [law of diminishing returns](https://web.archive.org/web/20231108092752if_/https://pmctraining.com/site/wp-content/uploads/2018/04/Law-of-Diminishing-Returns-CHART.png) (e.g., using [sane](https://www.privacyguides.org/en/basics/threat-modeling/), quality [blocklists](https://github.com/yokoffing/NextDNS-Config#blocklists-1); allowing most [TLDs](https://github.com/yokoffing/NextDNS-Config#block-top-level-domains-tlds-1-2-3-4-5-); etc.). 2) Pass the [girlfriend test](https://www.urbandictionary.com/define.php?term=Grandma%20Test) with few exceptions. These deviations are documented throughout the guide. *** ## Create your account Sign up for NextDNS [here](https://nextdns.io/?from=xujj63g5) and support this page! *** # Security :police_officer: Security settings protect your data from harm, theft, and unauthorized use.*^[why does this matter?](https://thenewoil.org/en/guides/prologue/why)* ## Threat Intelligence Feeds [1](https://github.com/nextdns/metadata/blob/6f9b6cd0670e7e31ad2ca716742088c2fc0616c2/security/threat-intelligence-feeds.json)  Use Threat Intelligence Feeds ## AI-Driven Threat Detection [1](https://x.com/NextDNS/status/1440291577713233925) > [!NOTE] > NextDNS labels this feature as [beta](https://www.vocabulary.com/dictionary/beta), although most users report it works well.  Enable AI-Driven Threat Detection ## Google Safe Browsing [1](https://safebrowsing.google.com/safebrowsing/report_general/) [2](https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/) [3](https://the8-bit.com/apple-proxies-google-safe-browsing-privacy/) [4](https://github.com/brave/brave-browser/wiki/Deviations-from-Chromium-(features-we-disable-or-remove)#services-we-proxy-through-brave-servers) > [!TIP] > Unlike the version embedded in some browsers, this feature does not associate your public IP address to threats and does not allow bypassing the block.  Enable Google Safe Browsing ## Cryptojacking Protection [1](https://github.com/nextdns/metadata/blob/6f9b6cd0670e7e31ad2ca716742088c2fc0616c2/security/cryptojacking.json) > [!CAUTION] > Leave this feature enabled if you use something other than the [recommended blocklists](https://github.com/yokoffing/NextDNS-Config#privacy-lock) (see https://github.com/yokoffing/NextDNS-Config/issues/31).  Enable Cryptojacking Protection ## DNS Rebinding Protection [1](https://help.nextdns.io/t/35hmval/what-is-dns-rebinding-protection) [2](https://www.reddit.com/r/nextdns/comments/t0ne8r/does_dns_rebinding_protection_block_remote_access/?context=3)  Enable DNS Rebinding Protection ## IDN Homograph Attacks Protection [1](https://web.archive.org/web/20230325073817/https://blog.riotsecurityteam.com/idn-homograph-attacksprevention) [2](https://akamai.com/blog/security/watch-your-step-the-prevalence-of-idn-homograph-attacks)  Enable Homograph Attacks Protection ## Typosquatting Protection [1](https://github.com/nextdns/metadata/blob/6f9b6cd0670e7e31ad2ca716742088c2fc0616c2/security/typosquatting/protected-domains)  Enable Typosquatting Protection ## Domain Generation Algorithms (DGAs) Protection  Enable DGA Protection ## Block Newly Registered Domains (NRDs) [1](https://boldgrid.com/instagram-influencer-accounts-are-being-hacked-phishing-attacks) > [!WARNING] > Blocking NRDs may cause [false positives](https://csrc.nist.gov/glossary/term/false_positive) [occasionally](https://www.reddit.com/r/InternetIsBeautiful/comments/w2wdro/comment/iguvg8y/?context=3). Be selective when adding NRDs to your allowlist; and, if you do, **NEVER** give [sensitive information](https://egnyte.com/guides/governance/sensitive-information) to a NRD. *If you plan to [set-and-forget](https://glosbe.com/en/en/set-and-forget) your configuration, disable this setting.*  Block Newly Registered Domains (NRDs) ## Block Dynamic DNS Hostnames [1](https://github.com/nextdns/ddns-domains/blob/main/suffixes) [2](https://x.com/NextDNS/status/1541740963760144386) > [!TIP] > Dynamic DNS (DDNS) services can still access their own website and update API when you use this setting.  Enable Block Dynamic DNS Hostnames ## Block Parked Domains [1](https://github.com/nextdns/metadata/blob/6f9b6cd0670e7e31ad2ca716742088c2fc0616c2/security/parked-domains-cname)  Block Parked Domains ## Block Top-Level Domains (TLDs) [1](https://webtribunal.net/blog/tld-statistics/) [2](https://www.spamhaus.org/reputation-statistics/cctlds/domains/) [3](https://bleepingcomputer.com/news/security/verified-twitter-accounts-hacked-to-send-fake-suspension-notices/) [4](https://github.com/DandelionSprout/adfilt/blob/master/Dandelion%20Sprout's%20Anti-Malware%20List.txt) [5](https://github.com/DandelionSprout/adfilt/issues/659#issuecomment-1284845803) *Updated: 18 March 2024*
> [!IMPORTANT]
> Blocking [TLDs](https://www.geeksforgeeks.org/components-of-a-url) risks blocking legitimate sites along with malicious ones, since this feature stops both site navigations and subrequests. However, the entries below should allow for everyday browsing while offering protection against commonly abused TLDs.
Click me to view TLDs
```
.autos
.best
.bid
.bio
.boats
.boston
.boutique
.charity
.christmas
.dance
.fishing
.hair
.haus
.loan
.loans
.men
.mom
.name
.review
.rip
.skin
.support
.tattoo
.tokyo
.voto
```
[Report](https://github.com/hagezi/dns-blocklists/issues/new/choose) occasional site and app issues. |
> [!TIP]
> Use different blocklists on separate DNS profiles (e.g., NORMAL for your router and PRO++ for your web browser).
You can also check out Hagezi's own [recommendations](https://github.com/hagezi/dns-blocklists/tree/main#whatshouldiuse).
### Why Hagezi?
[Hagezi](https://github.com/hagezi/dns-blocklists) block ads, trackers, native device trackers, and badware. He maintains a sensible allowlist, handles false positives quickly, and communicates known issues to blocklists maintainers. Hagezi's primary DNS lists combine multiple [sources](https://github.com/hagezi/dns-blocklists/wiki/FAQ#-which-sources-are-used-for-the-lists-and-how-are-the-lists-compiled-on-the-basis-of-these-sources) including respected community blocklists like [OISD](https://oisd.nl/), [Steven Black](https://raw.githubusercontent.com/StevenBlack/hosts/master/hosts), [1Hosts](https://github.com/badmojr/1Hosts#safeguard-your-devices-against-pesky-ads-trackers-and-malware), [notrack](https://gitlab.com/quidsup/notrack#notrack), and [more](https://github.com/hagezi/dns-blocklists/blob/main/sources.md).
You may also wonder why other lists are not utilized. This is because many list maintainers:
* do not remove [false positives](https://csrc.nist.gov/glossary/term/false_positive) and/or are no longer active [1](https://github.com/lightswitch05/hosts/issues/356) [2](https://github.com/EnergizedProtection/block/issues/916)
* already [aggregate](https://www.reddit.com/r/nextdns/comments/ys3s1s/confused_about_blocklists/ivxdcd2/?context=3) common blocklists into their own list (Easylist/Fanboy, AdGuard, Steven Black, etc.) [1](https://github.com/badmojr/1Hosts/blob/master/-data/lists/assets.txt) [2](https://oisd.nl/includedlists/big/0) [3](https://github.com/jerryn70/GoodbyeAds/blob/master/Docs/Sources.md) [4](https://github.com/hagezi/dns-blocklists/blob/main/sources.md#sources)
* offer no meaningful additional coverage when compared with the chart combinations above
## Native Tracking Protection [1](https://github.com/nextdns/native-tracking-domains/tree/main/domains)
Add all the device brands you use.
> [!WARNING]
> Disabling this setting prevents some email links from opening properly.
 Allow Affiliate & Tracking Links
***
# Parental Control :family_man_woman_boy:
## YouTube Restricted Mode
 Enforce YouTube Restricted Mode
## Block Bypass Methods [1](https://github.com/nextdns/dns-bypass-methods)
Block tools that can bypass NextDNS filtering, such as VPNs, proxies, Tor software, and encrypted DNS services.
> [!CAUTION]
> Enabling this setting causes unintended behavior.
 Block Bypass Methods
***
# Denylist :no_entry:
Denylist entries are always blocked. These entries may further harden some profiles while not interfering with everyday browsing.
### iCloud Private Relay
[iCloud Private Relay](https://support.apple.com/en-us/102602) can override DNS settings on devices, preventing NextDNS from protecting them.
Some DoH providers block this feature automatically.
mask.icloud.com
***
# Allowlist :white_check_mark:
Allowlist entries always resolve. These entries may be needed for aggressive DNS profiles to relax their rules.
### NextDNS
Allow NextDNS itself in case a filterlist goes [haywire](https://help.nextdns.io/t/m1hs207/energized-ultimate-lists-blocking-nextdns) and blocks your access.
nextdns.io
Click here to view more entries
### Facebook / Instagram [1](https://github.com/jerryn70/GoodbyeAds/issues/309)
graph.facebook.com
graph.instagram.com
i.instagram.com
b-graph.facebook.com
If you're still having issues, try [these](https://raw.githubusercontent.com/hagezi/dns-blocklists/main/share/facebook.txt):
connect.facebook.com
connect.facebook.net
graph-fallback.facebook.com
z-m-graph.facebook.com
graph-fallback.instagram.com
### Apple device updates [1](https://github.com/badmojr/1Hosts/issues/536) [2](https://github.com/badmojr/1Hosts/issues/562) [3](https://github.com/nextdns/metadata/pull/1132#issuecomment-1331733770)
A [known tracking domain](https://gizmodo.com/apple-iphone-analytics-tracking-even-when-off-app-store-1849757558), but it's needed for device updates.
xp.apple.com
### Apple iMessage GIFs [1](https://github.com/badmojr/1Hosts/issues/560) / Spotlight Search [2](https://github.com/badmojr/1Hosts/issues/562)
smoot.apple.com
### Apple Store [1](https://www.reddit.com/r/nextdns/comments/xx4cwn/solutionapple_store_connection_issues)
amp-api-edge.apps.apple.com
amp-api-search-edge.apps.apple.com
### Windows
This [request](https://oisd.nl/excludes.php?w=settings-win.data.microsoft.com) is blocked when using NextDNS' [Native Tracking](https://github.com/yokoffing/NextDNS-Config#native-tracking-protection-1) list (Windows)
settings-win.data.microsoft.com
### Xbox achievements
v10.events.data.microsoft.com
v20.events.data.microsoft.com
### Xiaomi device updates
update.intl.miui.com
### Xiaomi USB debugging (Security settings)
srv.sec.intl.miui.com
### Google Nest usage metrics [1](https://www.reddit.com/r/nextdns/comments/yzvnuw/nest_usage_metrics_being_blocked)
logsink.devices.nest.com
### Yahoo Mail [1](https://github.com/hagezi/dns-blocklists/issues/269)
consent.yahoo.com
guce.oath.com
pr.comet.yahoo.com
### [Spectrum](https://spectrum.net) login [1](https://github.com/badmojr/1Hosts/issues/640)
pov.spectrum.net
### Zoom [1](https://oisd.nl/excludes.php?w=log.zoom.us) [2](https://oisd.nl/excludes.php?w=us04logfiles.zoom.us)
logfiles.zoom.us
us04logfiles.zoom.us
us04zpns.zoom.us
### YouTube history
s.youtube.com
### Hulu [1](https://github.com/badmojr/1Hosts/issues/762)
ads-fa-darwin.hulustream.com
### Epic Games Launcher [1](https://github.com/badmojr/1Hosts/issues/643)
eulatracking-public-service-prod06.ol.epicgames.com
### NVIDIA Gefore Experience [1](https://github.com/badmojr/1Hosts/issues/650)
gfe.nvidia.com
nvgs.nvidia.cn
### Chick-Fil-A App [1](https://www.reddit.com/r/nextdns/comments/zaqio0/comment/iz7v9di/?utm_source=share&utm_medium=web2x&context=3)
tmetrix.my.chick-fil-a.com
### [imgur](https://imgur.com) [1](https://github.com/lightswitch05/hosts/issues/358) [2](https://www.reddit.com/r/nextdns/comments/t3jmvk/imgur_loads_then_goes_blank_no_matter_which)
js.media-lab.ai
### [CBS](https://cbsnews.com/live) News livestream [1](https://github.com/nextdns/metadata/issues/1030) [2](https://github.com/hagezi/dns-blocklists/issues/422)
doppler-config.cbsivideo.com
production-cmp.isgprivacy.cbsi.com
pubads.g.doubleclick.net
tags.tiqcdn.com
### [Paramount+](https://www.paramountplus.com/)
Paramount+ uses certain domains to display ads. These domains must be accessible to allow Paramount+ content to load (even for viewers with ad-free plans).
:warning: However, because many sites use these domains for ads, allowing them could result in more ads being shown on other sites you visit.
imasdk.googleapis.com
pubads.g.doubleclick.net
Users have [reported](https://www.reddit.com/r/nextdns/comments/v84ag6/paramount_plus/) that the following domains also may need to be allowed:
cbsaavideo.com
cbsi.com
conviva.com
convivia.com
demdex.net
dns-clientinfo.cbsivideo.com
partnerad.l.doubleclick.net
saa.cbsi.com
summerhamster.com (yes, really)
udm.scorecardresearch.com
### [FiveThirtyEight](https://fivethirtyeight.com) videos / [National Geographic](https://nationalgeographic.com) website [1](https://github.com/notracking/hosts-blocklists/issues/788)
dcf.espn.com
### [Men's Health](https://menshealth.com/nutrition/a40868905/chris-hemsworth-chicken-pasta-bake-recipe-centr) videos [1](https://github.com/badmojr/1Hosts/issues/651)
glimmer.hearstapps.com
macOS
Linux | [Firefox](https://www.mozilla.org/en-US/firefox/new/) (with [Betterfox](https://github.com/yokoffing/Betterfox#betterfox))
[Brave](https://www.privacyguides.org/en/desktop-browsers/#brave) | [uBlock Origin](https://addons.mozilla.org/blog/ublock-origin-everything-you-need-to-know-about-the-ad-blocker/)
Built-in blocker or [uBlock Origin](https://addons.mozilla.org/blog/ublock-origin-everything-you-need-to-know-about-the-ad-blocker/) | |
At the end of the day, if you're using [NextDNS](https://nextdns.io/?from=xujj63g5) + any browser with an ad blocker, you have more coverage than most people.
## Should I pay for NextDNS?
For the rich features it provides, [NextDNS](https://nextdns.io/?from=xujj63g5) is very affordable at $19.90/year for unlimited devices. NextDNS pays for itself if it saves my family from a malicious incident.
## Does the amount of features enabled affect the speed of NextDNS?[1](https://github.com/yokoffing/NextDNS-Config/issues/12#issue-1465457977) [2](https://www.reddit.com/r/nextdns/comments/135utai/comment/jilbus8/?=&context=3)
The number of settings you toggle on will not affect your DNS latency.
## Do I need to set DoH at browser-level if I already use NextDNS at system-level?
Unless you use a separate profile for the browser, it is [not neccessary](https://www.reddit.com/r/nextdns/comments/yfjvqy/is_it_redundant_to_set_at_doh_at_browserlevel_if/iu3vjzt/?context=3). However, I recommend [setting it in your web browser](https://itechtics.com/dns-over-https/#how-to-enable-or-disable-dns-over-https-in-your-browsers) anyway.
## I have a router profile and a device profile. Which one does my device use?
The device will use the profile set by the [NextDNS](https://nextdns.io/?from=xujj63g5) app or the installed [root CA](https://help.nextdns.io/t/g9hmv0a/how-to-install-and-trust-nextdns-root-ca). However, if the device has not been configured to use a separate profile, then it will use the wifi/router configuration.[1](https://www.reddit.com/r/nextdns/comments/yf4hnv/question_about_home_router_and_app_running_in/)
## What is the difference between security, privacy, and anonymity?
See [article](https://thenewoil.org/en/guides/prologue/secprivanon/) | [video](https://www.youtube.com/watch?v=Wpkh-hfULgE)
## Does NextDNS hide activity from my Internet Service Provider (ISP)?
Encrypted DNS queries boost privacy and security. This encryption stops your ISP from seeing what websites you search for and visit.
DNS protocols like DoH/DoT/DoQ are designed to increase privacy and security by encrypting DNS queries. They prevent your ISP from seeing your web searches and browsing history, which significantly contributes to protecting your privacy.
However, encrypted DNS does not hide website IP addresses from your ISP. While your ISP cannot see the specific domain you want to access, they can see that you contact DNS servers like Cloudflare or AWS. If you repeatedly send data to a certain IP address, your ISP can guess you are visiting a website at that address.
## Do I need a VPN?
IVPN [argues](https://www.ivpn.net/blog/why-you-dont-need-a-vpn/) you only need a VPN for three reasons. Mainly, in order to: