Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/celenityy/ublock-origin-settings
My recommendations for the ultimate configuration of uBlock Origin :)
https://github.com/celenityy/ublock-origin-settings
adblock adblock-list ads annoyances anti-fingerprinting filterlists metrics privacy privacy-protection security telemetry tracking ublock ublock-filters ublock-filters-rules ublock-list ublock-lists ublock-origin ublock-origin-filters
Last synced: about 1 month ago
JSON representation
My recommendations for the ultimate configuration of uBlock Origin :)
- Host: GitHub
- URL: https://github.com/celenityy/ublock-origin-settings
- Owner: celenityy
- License: gpl-3.0
- Created: 2024-06-17T20:57:57.000Z (8 months ago)
- Default Branch: main
- Last Pushed: 2024-12-26T21:59:21.000Z (about 2 months ago)
- Last Synced: 2024-12-26T22:27:34.230Z (about 2 months ago)
- Topics: adblock, adblock-list, ads, annoyances, anti-fingerprinting, filterlists, metrics, privacy, privacy-protection, security, telemetry, tracking, ublock, ublock-filters, ublock-filters-rules, ublock-list, ublock-lists, ublock-origin, ublock-origin-filters
- Homepage: https://codeberg.org/celenity/ublock-origin-settings
- Size: 65.4 KB
- Stars: 16
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- Funding: .github/FUNDING.yml
- License: LICENSE
Awesome Lists containing this project
README
# ublock-origin-settings
My recommendations for the ultimate configuration of uBlock Origin :)
**NOTE:** This project can be found on both [Codeberg](https://codeberg.org/celenity/ublock-origin-settings), which will act as the main & preferred way to contribute, and [GitHub](https://github.com/celenityy/ublock-origin-settings).
# Settings
Privacy:
* **Disable pre-fetching (to prevent any connection for blocked network requests)** -> ✅
* **Disable hyperlink auditing** -> ✅
* **Block CSP reports** -> ✅
* **Uncloak canonical names** -> ✅
Default behavior:
* **Disable JavaScript** -> ✅ *(This **will** cause breakage, but it heavily improves privacy & security, so I'd recommend enabling it if possible and if you're willing to re-enable JavaScript for websites that need it)*
Advanced:
* **I am an advanced user** -> ✅
# Filter lists
**Auto-update filter lists** -> ✅
**Suspend network activity until all filter lists are loaded** -> ✅
**Parse and enforce cosmetic filters** -> ✅
**Ignore generic cosmetic filters** -> ❌
# Lists
I would generally recommend configuring your filterlists as follows. This configuration matches [what my 'Phoenix' project uses](https://phoenix.celenity.dev/content-blocking), has been thoroughly tested, & is carefully considered for a balance between privacy, security, usability, & maintaining optimal performance.
## Built-in Lists
We'll first go over lists built-in to uBlock Origin.
> [!NOTE]
>I won't detail the **Regions, languages** category, as it heavily depends on you personally. My recommendation would be to **only** enable the lists you need here, if you need them at all.> [!TIP]
> 😇 means the list is enabled by default.
>
> ✅ means the list is already included, but you should enable it.* Built-in
* ✅ uBlock filters 😇
* [x] [uBlock filters – Ads](https://ublockorigin.github.io/uAssets/filters/filters.txt) 😇
* [x] [uBlock filters – Badware risks](https://ublockorigin.github.io/uAssets/filters/badware.txt) 😇
* [x] [uBlock filters – Privacy](https://ublockorigin.github.io/uAssets/filters/privacy.txt) 😇
* [x] [uBlock filters – Quick fixes](https://ublockorigin.github.io/uAssets/filters/quick-fixes.txt) 😇
* [x] [uBlock filters – Unbreak](https://ublockorigin.github.io/uAssets/filters/unbreak.txt) 😇
* Ads
* [x] [EasyList](https://ublockorigin.github.io/uAssets/thirdparties/easylist.txt) 😇
* [x] [AdGuard – Ads](https://filters.adtidy.org/extension/ublock/filters/2_without_easylist.txt) ✅
* [x] [AdGuard - Mobile Ads](https://filters.adtidy.org/extension/ublock/filters/11.txt) ✅* Privacy
* [x] [EasyPrivacy](https://ublockorigin.github.io/uAssets/thirdparties/easyprivacy.txt) 😇
* [x] [AdGuard Tracking Protection](https://filters.adtidy.org/extension/ublock/filters/3.txt) ✅
* [x] [AdGuard URL Tracking Protection](https://filters.adtidy.org/extension/ublock/filters/17.txt) ✅
* [x] [Block Outsider Intrusion into LAN](https://ublockorigin.github.io/uAssets/filters/lan-block.txt) ✅* Malware protection, security
* [x] [Online Malicious URL Blocklist](https://malware-filter.gitlab.io/urlhaus-filter/urlhaus-filter-ag-online.txt) 😇
* [x] [Phishing URL Blocklist](https://malware-filter.gitlab.io/phishing-filter/phishing-filter.txt) ✅* Multipurpose
* [x] [Peter Lowe’s Ad and tracking server list](https://pgl.yoyo.org/adservers/serverlist.php?hostformat=hosts&showintro=1&mimetype=plaintext) 😇
* [x] [Dan Pollock’s hosts file](https://someonewhocares.org/hosts/hosts) ✅* Cookie notices
* ✅ EasyList/uBO – Cookie Notices ✅
* [x] [EasyList - Cookie Notices](https://ublockorigin.github.io/uAssets/thirdparties/easylist-cookies.txt) ✅
* [x] [uBlock filters - Cookie Notices](https://ublockorigin.github.io/uAssets/filters/annoyances-cookies.txt) ✅
* ✅ AdGuard/uBO – Cookie Notices ✅
* [x] [AdGuard - Cookie Notices](https://filters.adtidy.org/extension/ublock/filters/18.txt) ✅
* [x] [uBlock filters - Cookie Notices](https://ublockorigin.github.io/uAssets/filters/annoyances-cookies.txt) ✅
* Social widgets
* [x] [EasyList - Social Widgets](https://ublockorigin.github.io/uAssets/thirdparties/easylist-social.txt) ✅
* [x] [AdGuard - Social Widgets](https://filters.adtidy.org/extension/ublock/filters/4.txt) ✅
* [x] [Fanboy - Anti-Facebook](https://secure.fanboy.co.nz/fanboy-antifacebook.txt) ✅* Annoyances
* ✅ EasyList - Annoyances ✅
* [x] [EasyList - Chat Widgets](https://ublockorigin.github.io/uAssets/thirdparties/easylist-chat.txt) ✅
* [x] [EasyList – Newsletter Notices](https://ublockorigin.github.io/uAssets/thirdparties/easylist-newsletters.txt) ✅
* [x] [EasyList - Notifications](https://ublockorigin.github.io/uAssets/thirdparties/easylist-notifications.txt) ✅
* [x] [EasyList - Other Annoyances](https://ublockorigin.github.io/uAssets/thirdparties/easylist-annoyances.txt) ✅
* ✅ AdGuard - Annoyances ✅
* [x] [AdGuard - Mobile App Banners](https://filters.adtidy.org/extension/ublock/filters/20.txt) ✅
* [x] [AdGuard – Other Annoyances](https://filters.adtidy.org/extension/ublock/filters/21.txt) ✅
* [x] [AdGuard – Popup Overlays](https://filters.adtidy.org/extension/ublock/filters/19.txt) ✅
* [x] [AdGuard – Widgets](https://filters.adtidy.org/extension/ublock/filters/22.txt) ✅
* [x] [uBlock filters – Annoyances](https://ublockorigin.github.io/uAssets/filters/annoyances.txt) ✅
## External Lists
We can now go over what lists you should **manually import** to uBlock Origin.
I would generally recommend importing & enabling the following:
### Privacy
* ⭐️ **➗ Actually Legitimate URL Shortener Tool**
```sh
https://raw.githubusercontent.com/DandelionSprout/adfilt/master/LegitimateURLShortener.txt
```* ⭐️ **🔍 yokoffing's Block third party fonts**
```sh
https://raw.githubusercontent.com/yokoffing/filterlists/main/block_third_party_fonts.txt
```* ⭐️ **⛔ yokoffing's click2load filters**
```sh
https://raw.githubusercontent.com/yokoffing/filterlists/main/click2load.txt
```* ⭐️ **Divested Fingerprinting Blocklist**
```sh
https://divested.dev/blocklists/Fingerprinting.ubl
```### Malware protection, security
* ⭐️ **⚠️ BadBlock - Unsafe**
```sh
https://badblock.celenity.dev/abp/unsafe.txt
```* ⭐️ **💊 Dandelion Sprout's Anti-Malware List**
```sh
https://raw.githubusercontent.com/DandelionSprout/adfilt/master/Dandelion%20Sprout's%20Anti-Malware%20List.txt
```* ⭐️ **🔏 HaGeZi's Dynamic DNS Blocklist**
```sh
https://gitlab.com/hagezi/mirror/-/raw/main/dns-blocklists/adblock/dyndns.txt
```* ⭐️ **💻 HaGeZi's Badware Hoster Blocklist**
```sh
https://gitlab.com/hagezi/mirror/-/raw/main/dns-blocklists/adblock/hoster.txt
```* ⭐️ **🔐 HaGeZi's Threat Intelligence Feeds**
```sh
https://gitlab.com/hagezi/mirror/-/raw/main/dns-blocklists/adblock/tif.txt
```* ⭐️ **FMHY Unsafe sites filterlist - Plus**
```sh
https://raw.githubusercontent.com/fmhy/FMHYFilterlist/main/filterlist.txt
```### Multipurpose
* ⭐️ **📙 HaGeZi Multi PRO++**
```sh
https://gitlab.com/hagezi/mirror/-/raw/main/dns-blocklists/adblock/pro.plus.txt
```
**Additionally**, if you're fine with occasional breakage at the cost of enhanced privacy & security, you could also consider using:
* ⭐️ **1Hosts (Pro)**
```sh
https://badmojr.gitlab.io/1hosts/Pro/adblock.txt
```* ⭐️ My **⚡️ BadBlock Lite**, **🔇 BadBlock**, OR **🔥 BadBlock+**
* Do **not** use all 3 together, pick **one** that works best for you! **🔇 BadBlock** is recommended for most users.
* **⚡️ BadBlock Lite**
```sh
https://badblock.celenity.dev/abp/badblock_lite.txt
```
* **🔇 BadBlock**
```sh
https://badblock.celenity.dev/abp/badblock.txt
```
* **🔥 BadBlock+**
```sh
https://badblock.celenity.dev/abp/badblock_plus.txt
```* ⭐️ **Divested Combined Blocklist**
```sh
https://divested.dev/hosts-domains-wildcards
```* ⭐️ **📕 HaGeZi - Multi ULTIMATE**
> [!NOTE]
> **Disable HaGeZi - Multi Pro++ from above if you decide to use this list.**```sh
https://gitlab.com/hagezi/mirror/-/raw/main/dns-blocklists/adblock/ultimate.txt
```Furthermore, **if you don't have a DNS content blocking solution in place *(you should)***, or you just can't use the relevant list on your DNS blocker, you could also use the following:
* ⭐️ **HaGeZi's Most Abused TLDs**
```sh
https://gitlab.com/hagezi/mirror/-/raw/main/dns-blocklists/adblock/spam-tlds-ublock.txt
```* ⭐️ **HaGeZi/xRuffKez's Newly Registered Domains (14 days)**
```sh
https://raw.githubusercontent.com/xRuffKez/NRD/main/nrd-14day_adblock.txt
```* ⭐️ **OISD - Big**
```sh
https://big.oisd.nl
```Once you're finished choosing your lists, don't forget to select **Apply changes** & **Update now**.
# My filters
This is where it can really depend on you and your set-up. I'll provide my recommendations and filters here I myself use below:
First, I would highly recommend setting the following to protect against [IDN Homograph attacks](https://wikipedia.org/wiki/IDN_homograph_attack)
*You don't need to set this if you use BadBlock **Unsafe** above or if your DNS provider already provides IDN Homograph Attacks Protection (i.e. NextDNS)*:
```sh
xn--*
xn--*$doc,popup,frame
```I usually set the following to always enforce blocking Google's Doubleclick & Google Analytics: *[Why?](https://github.com/gorhill/uBlock/wiki/Privacy-stuff)*
```sh
||doubleclick.net^$important
||google-analytics.com^$important
```Additionally, I set the following to block social media tracking on websites:
```sh
||facebook.com^$important,third-party
||facebook.net^$important,third-party
||linkedin.com^$important,third-party
||instagram.com^$important,third-party
||tiktok.com^$important,third-party
||twitter.com^$third-party
||x.com^$third-party
```*See `My rules` section below for unbreaking X/Twitter...*
I also set this to block [tracking from Gravatar](https://github.com/gorhill/uBlock/wiki/Privacy-stuff):
```sh
||gravatar.com^$important,third-party
```I also set these rules to block 3rd party sign-in prompts from Google & Apple, as they're 1: annoying and 2: a tracking concern:
```sh
||accounts.google.com^$third-party
||appleid.apple.com^$third-party
||appleid.cdn-apple.com^$third-party
@@||accounts.google.com^$domain=youtube.com|chromium.org|gstatic.com|googleusercontent.com
@@||appleid.apple.com^$domain=appleid.cdn-apple.com
@@||appleid.cdn-apple.com^$domain=appleid.apple.com
```Since I block all 3rd-party requests *(will be explained further in `My rules` section below)*, I set the following rules to still allow CAPTCHAs for sites: *(Also see `My rules`)*
```sh
||challenges.cloudflare.com^$third-party
@@||challenges.cloudflare.com/cdn-cgi/challenge-platform/$third-party,script,frame
||www.google.com^$third-party,subdocument
@@||www.google.com/recaptcha/$third-party,subdocument
||www.gstatic.com^$third-party,script
@@||www.gstatic.com/recaptcha/$third-party,script
```Finally, I usually set the following to block the annoying banner on Old Reddit promoting Reddit's new UI.
```sh
www.reddit.com###redesign-beta-optin-btn
old.reddit.com###redesign-beta-optin-btn
```Once you are done here, make sure to select **Apply changes**.
# My rules
First, I typically set the following to block all 3rd party requests:
**I would not recommend this for most people, as you will basically have to unbreak pages yourself, but it provides the most private, secure, and fastest configuration possible.**
```sh
* * 3p block
* * 3p-frame block
* * 3p-script block
```If you don't want as much breakage, you could potentially only set:
```sh
* * 3p-frame block
```This only blocks 3rd party frames, while keeping other resources untouched. I would recommend this if you have the tolerance to allow 3rd party frames for pages that need them, but still want a nice boost in privacy, security, & performance.
I then set the following to allow CAPTCHAs for sites:
```sh
* challenges.cloudflare.com * noop
* www.google.com * noop
* www.gstatic.com * noop
```I also set the following to unbreak X/Twitter based off the filters we set above:
```sh
x.com twitter.com * nooptwitter.com x.com * noop
```⭐️ If you block 3rd party connections like me, then I would recommend also using the [LocalCDN](https://www.localcdn.org/) extension with the following settings, as this will reduce breakage:
# LocalCDN -> Basic
**Hide donation button** -> ✅
# LocalCDN -> Advanced
**Block Google Fonts** -> ❌ *This is already covered by Yokoffing's `Block third party fonts` list that we added, leaving Google Fonts blocked here as well will just cause issues & breakage*
Now, back to uBlock Origin, you should add the following rules in uBlock Origin for LocalCDN to be active:
```sh
* ajax.googleapis.com * noop
* ajax.aspnetcdn.com * noop
* ajax.microsoft.com * noop
* cdnjs.cloudflare.com * noop
* code.jquery.com * noop
* cdn.jsdelivr.net * noop
* fonts.googleapis.com * noop
* yastatic.net * noop
* yandex.st * noop
* apps.bdimg.com * noop
* libs.baidu.com * noop
* cdn.staticfile.org * noop
* cdn.bootcss.com * noop
* mat1.gtimg.com * noop
* lib.sinaapp.com * noop
* upcdn.b0.upaiyun.com * noop
* stackpath.bootstrapcdn.com * noop
* maxcdn.bootstrapcdn.com * noop
* netdna.bootstrapcdn.com * noop
* use.fontawesome.com * noop
* ajax.cloudflare.com * noop
* akamai-webcdn.kgstatic.net * noop
* gitcdn.github.io * noop
* vjs.zencdn.net * noop
* cdn.plyr.io * noop
* cdn.materialdesignicons.com * noop
* cdn.ravenjs.com * noop
* js.appboycdn.com * noop
* cdn.embed.ly * noop
* cdn.datatables.net * noop
* mathjax.rstudio.com * noop
* cdn.mathjax.org * noop
* code.createjs.com * noop
* sdn.geekzu.org * noop
* ajax.proxy.ustclug.org * noop
* unpkg.com * noop
* pagecdn.io * noop
* cdnjs.loli.net * noop
* ajax.loli.net * noop
* fonts.loli.net * noop
* lib.baomitu.com * noop
* cdn.bootcdn.net * noop
* fonts.gstatic.com * noop
* ajax.loli.net.cdn.cloudflare.net * noop
* akamai-webcdn.kgstatic.net.edgesuite.net * noop
* apps.bdimg.jomodns.com * noop
* cdn.bootcdn.net.maoyundns.com * noop
* cdn.bootcss.com.maoyundns.com * noop
* cdn.embed.ly.cdn.cloudflare.net * noop
* cdn.jsdelivr.net.cdn.cloudflare.net * noop
* cdnjs.loli.net.cdn.cloudflare.net * noop
* cds.s5x3j6q5.hwcdn.net * noop
* developer.n.shifen.com * noop
* dualstack.osff.map.fastly.net * noop
* fonts.loli.net.cdn.cloudflare.net * noop
* gateway.cname.ustclug.org * noop
* iduwdjf.qiniudns.com * noop
* lb.sae.sina.com.cn * noop
* lib.baomitu.com.qh-cdn.com * noop
* mat1.gtimg.com.tegsea.tc.qq.com * noop
* materialdesignicons.b-cdn.net * noop
* mscomajax.vo.msecnd.net * noop
* sdn.inbond.gslb.geekzu.org * noop
* use.fontawesome.com.cdn.cloudflare.net * noop
* vo.aicdn.com * noop
```Once you're done configuring your rules here, select **Save** & **Commit**.
# Additional recommendations
* Use [Firefox](https://www.mozilla.org/firefox/) with my [Phoenix](https://phoenix.celenity.dev), as Firefox respects your privacy and [has the best support for uBlock Origin](https://github.com/gorhill/uBlock/wiki/uBlock-Origin-works-best-on-Firefox). **You do not need to configure uBlock Origin with this guide if you use Phoenix, as it is already pre-configured out of the box.**
* Enable Safe Browsing in your browser if possible and if it's not done in a privacy-invasive way. (You should use i.e. [Google Safe Browsing on "Standard" Mode](https://safebrowsing.google.com/), [Firefox's Safe Browsing](https://support.mozilla.org/kb/how-does-phishing-and-malware-protection-work), & [Brave's Safe Browsing](https://brave.com/privacy/browser/#safe-browsing), you should avoid most other options i.e. [Google Safe Browsing on "Enhanced" Mode](https://safebrowsing.google.com/), [Microsoft SmartScreen](https://learn.microsoft.com/windows/security/operating-system-security/virus-and-threat-protection/microsoft-defender-smartscreen/), & [Opera Sitecheck](https://blogs.opera.com/security/2021/01/making-browsing-safe-from-phishing/)).
* Use a private, secure, & reputable DNS provider of your choice. I would recommend setting up your own [NextDNS](https://nextdns.io) configuration if you are able to *(See my recommendations for NextDNS [here](https://codeberg.org/celenity/nextdns-settings))*, otherwise I would recommend [Quad9](https://quad9.net/). If you're using a Chromium browser, make sure to configure your DNS provider on **both** your OS and in your browser. This will allow you to take advantage of [Encrypted Client Hello](https://blog.cloudflare.com/announcing-encrypted-client-hello). This is unnecessary on Firefox-based browsers, however it could still be useful to set in both places if for instance you want to set a separate client name for your browser than the rest of your OS, to better determine what queries are coming from where.
* Use a (reputable) anti-virus if possible. On Windows, you can use the built-in [Microsoft Defender Antivirus](https://wikipedia.org/wiki/Microsoft_Defender_Antivirus), on macOS, you can stick to the built-in [XProtect](https://support.apple.com/guide/security/protecting-against-malware-sec469d47bd8/web), on Android, you can use [Hypatia](https://f-droid.org/packages/us.spotco.malwarescanner/), and on Linux, you can use [ClamAV](https://www.clamav.net/). **NOTE:** You should install Hypatia through the [DivestOS Official Repo](https://divestos.org/fdroid/official/?fingerprint=E4BE8D6ABFA4D9D4FEEF03CDDA7FF62A73FD64B75566F6DD4E5E577550BE8467) instead of F-Droid's main repo, as it will allow you to receive quicker updates directly from the developer. It's also recommended to use [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic/) as your F-Droid client of choice.