Just another custom hosts file
This aim to…
- Support to any apps and/or tools that can download one hosts file at a time! (e.g. NetGuard, TrackerControl, Lightning Browser v5.0.x and above)
- Support Thai users who want to block unwanted connections, both from Thai sites and common sites. (e.g. Facebook, YouTube, Google, etc.)
I don’t have or don’t know any kind of automation, sorry if I didn’t update this repo frequently enough.
All credits and license goes to upstream, both hosts file sources and binary that I’m using…
Hosts File Generator
Hosts File Sources
- Angela
- badmojr
- DurableNapkin
- Various blocklists
- Avast
- CoViD-19 Cyber Threat Coalition
- Converted as hosts file format from https://www.cyberthreatcoalition.org
- Various blocklists
- lightswitch05
- socram8888
- Soteria
- StevenBlack
- ZeroDot1
- kowith337 (Yes, it’s me!)
- ThaiAntiTokenSites
- ThaiConsentHosts
- Personal FilterList Collections
- Google
AdService
andID
tracking - Google hotwords blocking
- Thai Bad Bait List - Top Level Only
- Facebook Zero Hosts Block
- LINE ads (partial)
- Custom leftover hosts
Sub part of this hosts file also contains some entry from…
- http://utaukitune.ldblog.jp/archives/65725024.html
- https://github.com/jmdugan/blocklists/tree/master/corporations/mozilla/all
- Custom blocked and allowed that also appear on this repository.
- Google
or see all hosts sources blob
Copy Raw Location below!
- Make a text and then copy
https://raw.githubusercontent.com/kowith337/CustomHosts-via-hostsmgr/unarranged/hosts.txt
- Right Click or Tap and Hold to copy address or download
- See and scan QR Code (via DuckDuckGo)
Warning before use!
If you are…
- Rarely or never browsing some Thai websites.
- Use these feature in popular (by force) browser in Android :tm: system…
- Use their data saving while use that browser.
- Download suggested articles and read them offline.
- Allow it to retrieve suggest article and websites everytime before you’re start browsing internet by your own.
- Save and sync your forms and credentials (aka.
passwords
) accross devices within that browser, also mobile OS system-wide auto fill.
- Integrate or login with your
Facebook
accounts into third party apps and/or games. - Using
Facebook
(either for free or not) over mobile data that your carrier have theFree Basics
service available. - Want to allow
YouTube
to save your watched history, partially watched video that remember position before you leave, etc. - Stuck at some site that still rely to connecting to proper ads and/or tracking servers before getting/reading/viewing/watching contents.
- Let the big brother suggest the word to searching something, while you’re submitting keystroke to them! (Yes, every letters you’ve typed!!)
- Read the news and/or article directly from big brother’s search engine results, with the lightweigh load from the big brother’s engine called
AMP
!
Then this hosts file may not suitable for you, and I won’t whitelist for unbreak unless the hosts aren’t related to any ads and/or tracking services.
That’s all!
Please note that if you’re still using
Google Chrome
and found out that it doesn’t block anyting, maybe it’s will be effective if you’ve config to disable these features below…
Asynchronous DNS resolver flags- Internal
Data Saver
that proxy everything and compress all resources that extended quota for some limited mobile data plan.- Secure DNS (aka.
DoH
), you should turn off completely, not let it left automatic.As well if your phone are running Android 9+ or above, make sure you’ve disable Private DNS (aka. native DoT) in phone settings, too!
Otherwise, here’s a choice of browser forks that respect privacy enough…
Chromium forks
- Bromite
- DroidChrome (aka. Marmaduke’s Chromium)
- Mulch
- Ungoogled Chromium
Firefox forks
- Librewolf (Multi-OS PC)
- Mercury
- Mull Fenix
Why turn off secure/private DNS?
- With default (automatic) settings, it’s mostly connect to well-know big companies, e.g.
CloudFlare
,XFinity
,Cisco
,CleanBrowsing
,Quad9
and alsoGoogle
itself! - Even you’ve changed to other DoT/DoH servers, it’s mean you’ve lost protection since every DNS requests are passed to system DoT and/or in-browser DoH endpoint, not any protection apps or clients!