NSABlocklist© project original created under the MIT license 2015 by CHEF-KOCH.
This isn't yet another hosts file or DNSBL that claims to secure the web, it's specially designed to stop known NSA / GCHQ / C.I.A. or F.B.I. servers from being connecting to you without permission, of course the IP's also can be used for Bot Revolt or other tools. The list is not designed to block common malware, spyware/ads or anything that is already available on the net via a proper designed hosts for such special case. This hosts or the super ranges lists could block some of your sites/servers you may need, so you'll be warned!
My list is original based on 2007 published Wikileaks documents and includes my CHEF-KOCH's modifications from 2008, 2012, 2014 and 2015.
This fork:
- Removes most of the documents that aren't blocklists
- Makes blocklists compatible with pi-hole
- Adds a blocklist that removes the excessive GOV URLs (since pi-hole blocks at DNS level)
- Updates README (while giving complete credit and donor link to CHEF-KOCH to continue to his work)
- A 'HOSTS (excluding most GOV URLs)' file that includes all Servers/DNS domains that are known to be involved in spying. The confirmation is given within the Research link(s) at the bottom and with my own tests.
- A 'HOSTS (including excessive GOV URLs)' file that includes all Servers/DNS domains that are known to be involved in spying. The confirmation is given within the Research link(s) at the bottom and with my own tests.
- An 'LICENSE' File to shows the MIT license.
- The 'README' (this) file that includes the latest news, updates and explanations,...
- The 'References.txt' which contains relevant information about spying or additional topics which may related to reveal surveillance.
- Feel free to open an issue ticket and I will look at it asap. - Pull Requests or ideas are always welcome!
- A true list of compromised IPs would list the entire Internet, then on to the fuller range open mouth blabbering of blogs, email, chat rooms, texting, aided and abetted by the world's telecoms, postal services, and, most reliably, bedroom murmurings.
- I do not accept donations, I'm not doing this because I want $$money or hype, I'm doing this because I didn't found a proper list on the whole internet and of course I want to share my knowledge for free. I always think that such information should be available for everyone on the world.
- Please keep in mind that updates/encryption/knowledge is our only weapon against NSA and other agencies, since I not encrypt this list (for what?) the update argument is important so I always search for maintainer to complete the list(s). It's currently not possible to update everything daily or every x hours since there is no tool/software/script which detect such servers automatically - it needs to be checked against domain servers, trace-routes, documents - all by hand!
- I do not hate the NSA or other agencies but I really don't like that everyone is automatically under the microscope (mass surveillance) and of course that there is no 'opt-out' or transparency except lies and more lies (and some excuses ...yeah, we are doing this because terrorism, go f$ck yourself with such statements!)
- Everyone have something to hide, passwords, private data, accounts, other meta-data, [...]
- An HOSTS file is no guarantee that if the NSA is already 'in your system/network' - to protect you - it's just to late.
- HOSTS files are no guarantee that NSA or any other attacker/organization could simply bypass it via 0day or other vulnerabilities on your system/router.
- HOSTS files can't protect against attacks directly in hardware, e.g. if the router is already compromised or comes with backdoors this list will be easily bypassed anyway.
- Due the complex of the entire file I can't explain every single IP/Domain/PTR record. If something was changed, feel free to open a pull request or send me an eMail.
- The GOSTS file may present an attack vector for malicious software because the file could be modified to redirect the entire traffic e.g. adware/trojans can do this. Ensure that the file was marked as read-only and you're not logged in as administrator.
- Trace-route analysis especially on IPv4 networks are sometimes outdated (due the mass of requests).
- Be careful when blocking IP addresses, as IP addresses change frequently and can block people you don't intend to block.
- NSA and other agencies can spy on traffic directly from supercomputers like infamous Echelon connected directly to some backbone without revealing any IP. This is an common problem, only strong and proper implemented encryption helps.
- TCPIPUTILS
- Robtex
- ZMap - The Internet Scanner
- IP Address Details (ipinfo.io)
- tracert nsa.gov, see how TRACERT command works
- ... others
- GlobalLeaks [Open-source anonymous whistleblowing software]
- Freedom Box
- DenyHosts
- Decode Your HTTP Traffic with Open Source Sysdig (sysdig.com)
- Courage Foundation
- The NSA files | The Guardian
- Unofficial page to search E. Snowden leaked documents
- https://edwardsnowden.com/revelations/
- Free Haven's Selected Papers in Anonymity
- http://cjfe.org/snowden
- https://github.com/nsa-observer/documents/tree/master/files/pdf
- https://www.aclu.org/nsa-documents-search
- http://freesnowden.is/category/revealed-documents/index.html
- NSA Spying | Electronic Frontier Foundation
- https://www.eff.org/deeplinks/2013/11/nsa-spying-primary-sources
- https://www.aclu.org/nsa-documents-released-public-june-2013
- http://leaksource.wordpress.com/
- https://fveydocs.org/
- https://www.aclu.org/nsa-documents-search
- http://natsios-young.org/
- https://nsa.imirhil.fr/
- https://nsa.gov1.info/dni/
- https://snowdenarchive.cjfe.org/
- AT&T helped to spy on an array of internet traffic | The New York Times & via ProPublica
- Telecom / T-Mobile
- Vodafone
- E-Plus / O2
- Alphabet (Goolgle) 'Project Fi alias T-Com' [Apr. 2015, needs a special Fi SIM for Nexus 6 XT1103 only (atm)]
- Digital Ocean, Inc.s
- TM Net, Internet Service Provider
- REN
- Verizon
- TNG
- Spint
- easybell
- L8NT
- Charter
- Suddenlink
- Sprint
- Unicom (GFW)
- CERNET (GFW)
- Embarq
- ....
- NSA IA Guidance incl. several pdf's.
- AT&T
- ATM S.A.
- Cable & Wireless
- Global Crossing
- Comcast
- Cox Communications
- Sprint Nextel
- Level 3 / Level 2 / Level 1
- NTT Communications
- SAVVIS Communications
- Net By Net Holding LLC
- Verizon Communications
- ATM-Telekom
- IBM
- ...
The following providers know you 'Secret Key' or spying on you.
Keys:
- Astril / way2stars
- EarthVPN / earthvpn
- GFwVPN / gfwvpn
- GoldenFrog / thisisourkey
- IBVPN / ibVPNsharedPSK!
- IPVanish / ipvanish
- NordVPN / nordvpn
- PureVPN / 12345678
- SlickVPN / gogoVPN
- TorGuard / torguard
- TigerVPN / tigerVPN
- UnblockVPN / xunblock4me
- VPNReactor / VPNReactor
Spying:
HotSpotShield
Research:
- https://www.google.com/#q=goldenfrog+thisisourkey Archive
- http://www.gfwvpn.com/?q=node/224 Archive
- https://www.vpnreactor.com/android_l2tp_ipsec.html Archive
- http://unblockvpn.com/support/how-to-set-up-l2tp-on-the-android.html Archive
- http://www.ibvpn.com/billing/knowledgebase/34/Set-up-the-VPN-connection-on-Android-handsets.html Archive
- https://www.astrill.com/knowledge-base/50/L2TP-IPSec-PSK---How-to-configure-L2TP-IPSec-on-Android.html Archive
- http://billing.purevpn.com/knowledgebase.php?action=displayarticle&id=33 Archive
- https://www.privateinternetaccess.com/pages/client-support/ Archive
- http://torguard.net/knowledgebase.php?action=displayarticle&id=58 Archive
- https://www.ipvanish.com/visualguides/L2TP/Android/ Archive
- http://www.earthvpn.com/android-l2tp-setup-guide/ Archive
- https://nordvpn.com/tutorials/android/l2tpipsec/ Archive
- https://help.tigervpn.com/support/search/solutions?term=shared+secret+tigerVPN Archive
- https://www.slickvpn.com/tutorials/ipsec-for-iphone/ Archive
- DoubleHop.me: Archive and http://archive.is/MZgWE and http://imgur.com/Zn5HSIj
Recommendation from Cauchon:
- PushTalk / PalTalk
- MySpace
- Google Inc. alias Alphabet
- Amazon
- Microsoft
- Apple
- Wikipedia, well it's for all
- Automattic, Inc
- LLC
- Yahoo
- Twitter (FBI records)
- ....
- XKeyscore
- PRISM
- ECHELON
- Carnivore
- MUSCULAR
- DISHFIRE
- STONEGHOST
- Tempora
- Frenchelon Active-Passive-Exfilration (APEX)
- Fairview
- MYSTIC
- Boundless Informant
- BULLRUN
- PINWALE
- Stingray
- TURMOIL / Turbulence
- Customer Proprietary Network Information / CPNI (metadata) - can be deactivated on Android 5.1+ and e.g. Fi networks
- Traceroute "Packaged Goods" / "Treasure Map"
- VOIP: Hammerchant
- WEALTHYCLUSTER
- APEX
- COMSAT
- IRRITANT HORN (hijack's Google Play Store contained apps)
- HACIENDA
- ....
Thanks goes to everyone which are fighting for www. security! Give spying no chance!