Guidelines
- Must pass the "girlfriend test"
- Follow the law of diminishing returns by not overblocking (e.g., Energized Ultimate, 1Hosts Pro, blocking too many TLDs, etc.)
Security
Threat Intelligence Feeds
AI-Driven Threat Detection
Enable AI-Driven Threat Detection
Google Safe Browsing
Cryptojacking Protection
Enable Cryptojacking Protection
DNS Rebinding Protection
Enable DNS Rebinding Protection → ☢️ Enabling may cause breakage (unlikely)
IDN Homograph Attacks Protection
Enable Homograph Attacks Protection
Typosquatting Protection
Enable Typosquatting Protection
Domain Generation Algorithms (DGAs) Protection
Block Newly Registered Domains (NRDs)
Block Newly Registered Domains (NRDs) → ☢️ Enabling may cause breakage
Many NRDs are nefarious while a few are legitimate.
Here's a recent (June 2022) incident of a scam using a NRD (example | commentary 1 2). Another example is social media account hacks where users click on links in their private messages.
This is marked as disabled because it will cause false positives (see guideline #1). However, if you are comfortable allowlisting occasionally, it is strongly encouraged that you enable this. Selectively add NRDs to your allowlist; and if you add certain ones to your allowlist, NEVER give sensitive information to a NRD.
Block Dynamic DNS Hostnames
Enable Block Dynamic DNS Hostnames
Block Parked Domains
Block Top-Level Domains (TLDs)
☢️ Enabling may cause breakage
.work
.fit
.surf
.info
.cam
.ci
.cf
.cn
.ga
.gq
.ml
.online
.tk
.top
References:
- https://www.gomyitguy.com/blog-news-updates/malicious-domain-extensions
- https://www.spamhaus.org/statistics/tlds/
- .info - https://www.bleepingcomputer.com/news/security/verified-twitter-accounts-hacked-to-send-fake-suspension-notices/
- .online - https://www.reddit.com/r/gaybros/comments/vqb2q9/warning_stop_upvoting_these_be_gay_do_crime_posts/ieoyygw/
Block Child Sexual Abuse Material
Block Child Sexual Abuse Material
Privacy
Blocklists
NextDNS Ads & Trackers Blocklist
AdGuard DNS filter
oisd
1Hosts (Lite)
Native Tracking Protection
☢️ Enabling may cause breakage (unlikely)
Add these brands according to what devices you use. There's no advantage in adding brands you don't own; however, there’s no disadvantage in adding unused brands either.
Xiaomi
Huawei
Samsung
Amazon Alexa
Windows
Apple
Roku
Sonos
Block Disguised Third-Party Trackers
Block Disguised Third-Party Trackers
Allow Affiliate & Tracking Links
Allow Affiliate & Tracking Links
Parental Control
YouTube Restricted Mode
Enforce YouTube Restricted Mode → ☢️ Enabling may cause breakage
Block Bypass Methods
Block Bypass Methods → ☢️ Enabling may cause breakage
Denylist
(optional) Most of these are blocked under Block Dynamic DNS Hostnames (see here).
pubnub.com
ddns.net
duckdns.org
hopto.org
linkpc.net
myddns.me
myftp.biz
myftp.org
ngrok.io
no-ip.biz
no-ip.org
portmap.host
portmap.io
publicvm.com
sytes.net
zapto.org
Allowlist
Facebook and Instagram
graph.facebook.com
graph.instagram.com
Apple device updates and iMessage giphs | 1 2 3 4
smoot.apple.com
xp.apple.com
Microsoft Edge update | 1
browser.events.data.msn.com
self.events.data.microsoft.com
mobile.pipe.aria.microsoft.com
CBS News streaming
production-cmp.isgprivacy.cbsi.com
Settings
Block Page
Enable Block Page → ☢️ Enabling may cause breakage if the NextDNS Root CA is not on your devices
Anonymized EDNS Client Subnet
Enable Anonymized EDNS Client Subnet
Cache Boost
CNAME Flattening
Web3 (optional)
Credit
Forked from the crssi config. Some inspiration came from the scafroglia93 config while other ideas are my own.