Skip to content
HOSTS file and research project to block all known NSA / GCHQ / C.I.A. / F.B.I. spying server
Branch: master
Clone or download
Latest commit 8cf7e41 Mar 10, 2019
Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
ASN-Script ASN blocking is here, forget IP based blocking ... Aug 10, 2017
Bypass Added several DNS based lists based on their censorship global rank (… Aug 25, 2017
Documents The U.S. Government Has Amassed Terabytes of Internal WikiLeaks Data Jan 12, 2019
Sandboxie more tools and scripts added May 11, 2017
Trackers canvas font fingerprinting pages added Aug 6, 2017
test IP-Filter update (196320 rules) Mar 3, 2019
Campaigns against surveillance.md added A.B. 1584 Oct 1, 2018
HOSTS HOSTS updated v0.0.18 May 21, 2018
LICENSE
README.md
References.md Rename References.txt to References.md Sep 17, 2018
Super Ranges.txt
Todo.md
big-brother.jpg
problematic.txt
publickey.CHEF-KOCH@protonmail.com.asc Proper key added Dec 5, 2018

README.md

NSABlocklist© project original created under the ISC license 2015 - 2019 by CHEF-KOCH.

Matrix Twitter Follow Discord Say Thanks!

Description

This isn't yet another hosts file or DNSBL that claims to secure the web, it's specially designed to stop known NSA / GCHQ / C.I.A. or F.B.I. servers from being connecting to you without permission, of course the IPs also can be used for Bot Revolt or other tools. The list is not designed to block common malware, spyware/ads or anything that is already available on the net via a proper designed hosts for such special case. This hosts or the super ranges lists could block some of your sites/servers you may need, so you'll be warned!

My list is original based on 2007 published Wikileaks documents and includes my own modifications from 2008, 2012, 2014 and 2015.

Current Status: 2,45 Mio files (not everything upload [yet]). I need to wait for GitHub approval in order to bulk upload bigger file set (100MB+ files).

Mass surveillance is illegal

According to EGMR mass surveillance is now official against human rights.

You still can help keep the fight up against any surveillance programs!

This project includes

  • A 'HOSTS' file that includes all Servers/DNS domains that are known to be involved in spying. The confirmation is given within the Research link(s) at the bottom and with my own tests.
  • An 'Super Ranges.txt' file which includes a list of known IP ranges that are compromised (be careful with that!).
  • An 'LICENSE' File to shows the MIT license.
  • The 'README' (this) file that includes the latest news, updates and explanations,...
  • An 'problematic.txt' file which includes DNS/PTRs that are possible problematic for you.
  • The 'Mail.txt' file in case you want to speak with me over encrypted email.
  • An 'test' folder for IPv6 only domains. It also contains an 'html' folder for html formatted entries, an 'onion' folder for suspect or faked .onions and an 'Tor' folder for a quick guide how to run an non-exit relay in around 10 minutes.
  • The 'References.txt' which contains relevant information about spying or additional topics which may related to reveal surveillance.
  • Under the release page you will find complete collections/dumps.
  • Information on hardware based attacks.

Any problems, questions or something wrong?

  • Feel free to open an issue ticket and I will look at it asap.

Pull requests or ideas are in general always welcome!

Important Notice

  • I do not accept donations in this project, I'm not doing this because I want money, I'm doing this because I didn't found a proper list on the entire Internet and of course I want to share my knowledge with everyone for free. I always think that such information should be available for everyone on the world.
  • The project has no political orientation, there will be no political leaks/information since this is not the main mission here.
  • Please keep in mind that updates/encryption/knowledge is our only real weapon against NSA and other agencies. The more you know the better you can build strategies and new systems to defeat mass surveillance.
  • Please keep in mind that links to e.g. videos aren't valid because there (in most cases) doesn't include a source, date or author. Any information without proper research in it will automatically rejected and labeled as 'invalid' since it's impossible to verify if it's a legimate leak or not.

Do you hate the NSA or other agencies?

  • I do not hate the NSA or other agencies but I really don't like that everyone is automatically under the microscope (mass surveillance) and of course that there is no 'opt-out' or transparency except lies and more lies (and some excuses ...yeah, we are doing this because terrorism, go f$ck yourself with such statements!)
  • Everyone have something to hide, passwords, private data, accounts, other meta-data, [...]

Known problems

  • An HOSTS file is no guarantee that if the NSA is already 'in your system/network' - to protect you - it's just to late.
  • HOSTS files are no guarantee that NSA or any other attacker/organization could simply bypass it via 0day or other vulnerabilities on your system/router.
  • HOSTS files can't protect against attacks directly in hardware, e.g. if the router is already compromised or comes with backdoors this list will be easily bypassed anyway.
  • Due the complex of the entire file I can't explain every single IP/Domain/PTR record. If something was changed, feel free to open a pull request or send me an eMail.
  • The GOSTS file may present an attack vector for malicious software because the file could be modified to redirect the entire traffic e.g. adware/trojans can do this. Ensure that the file was marked as read-only and you're not logged in as administrator.
  • Trace-route analysis especially on IPv4 networks are sometimes outdated (due the mass of requests).
  • Be careful when blocking IP addresses, as IP addresses change frequently and can block people you don't intend to block.
  • NSA and other agencies can spy on traffic directly from supercomputers like infamous Echelon connected directly to some backbone without revealing any IP. This is an common problem, only strong and proper implemented encryption helps.

Utils

NSA Resources and public program(s)

Project History

  • 27.11.2018 NordVPN audit leaked.
  • 04.06.2018 Add Anti-NSA project list.
  • 03.06.2018 Ipfilter update, Amazon list finally fully merged.
  • 06.05.2018 Readme updates, pdf section sorted, new PDF files updated. Project Status added, several other minor changes.
  • 05.05.2018 Ipfilter update.
  • 22.03.2018 Bitcoing (Blockchain) tracking documents (revealed by E.S.) added
  • 21.01.2018 Intel, AMD, Trusted Computing papers added among Vault 8 (Hive) source and documentation
  • 30.01.2016 Video section added, official guidance from nsa.gov added + an section for future tips
  • 15.09.2015 Separate the into his own References.txt file (list was also updated)
  • 04.09.2015 Added Ipv6 list, sort the test lists in his own cat.
  • 02.09.2015 Added 'Snowden documents compilations'
  • 19.08.2015 Added Backbone Providers and other involved services
  • 18.08.2015 More domains added 7821 in total
  • 16.08.2015 Removed some duplicates and added new domains, small Readme.md changes
  • 15.08.2015 Created a new start page chef-koch.github.io/NSABlocklist
  • 14.08.2015 Initial upload of the entire project and small Readme.md corrections

Snowden documents compilations

Anti-NSA programs and networks

Compromised ISP Providers

ISP which are known to fight for privacy and a free internet

  • Bahnhof (Swedish)
  • Sonic (US)

Blockchain monitoring

  • OAKSTAR (sub-project MONKEYROCKET)
  • SHIFTINGSHADOW
  • ORANGECRUSH
  • YATCHSHOP
  • ORANGEBLOSSOM
  • SILVERZEPHYR
  • BLUEZEPHYR
  • COBALTFALCON

Videos

Tips directly from nsa.gov

Backbone Providers

  • AT&T
  • ATM S.A.
  • Cable & Wireless
  • Global Crossing
  • Comcast
  • Cox Communications
  • Sprint Nextel
  • Level 3 / Level 2 / Level 1
  • NTT Communications
  • SAVVIS Communications
  • Net By Net Holding LLC
  • Verizon Communications
  • ATM-Telekom
  • IBM

VPN providers which aren't secure, logging or selling your data to 3rd parties

Spying:

  • Hola (might sells data, according to their privacy policy)
  • HotSpotShield
  • Hide My Ass
  • ProXPN
  • PureVPN (proof)
  • EarthVPN
  • Betternet
  • Slickvpn (keeps logs)
  • IPVanish (keeps logs)
  • Opera VPN (might sells data, according to their privacy policy)
  • Psiphon (might sells data, according to their privacy policy)
  • Onavo Protect (might sells data, according to their privacy policy)
  • ZPN (might sells data, according to their privacy policy)
  • HoxxVPN (might sells data, according to their privacy policy)
  • FinchVPN (might sells data, according to their privacy policy)
  • TouchVPN (might sells data, according to their privacy policy)
  • TurboVPN
  • VPN Proxy Master
  • Snap VPN
  • X-VPN 5M
  • VPN 360 1M
  • VPN – Super Unlimited Proxy
  • Free VPN by FreeVPN.org
  • Secure VPN
  • VPN – Master Proxy
  • HotspotVPN
  • SkyVPN
  • VPN Patron
  • VPN for iPhone
  • YogaVPN
  • VPN Guru
  • Hola
  • Hotspot Shield
  • Betternet
  • TouchVPN
  • Shield VPN
  • VPN Wifi Proxy Security Master
  • Victory VPN
  • Storm VPN (unclear)
  • SuperVPN Free VPN Client
  • VPN Private
  • Thunder VPN
  • VPN Melon
  • Super VPN
  • #VPN
  • Psiphon
  • AnchorFree
  • StackPath
  • Avast (owns three brands: HideMyAss, Avast Secureline VPN, AVG Secure VPN, and Zen VPN)
  • Kape and Gaditek

Recommendation:

See here for a more detailed comparison chart - keep in mind that this chart is not 100% correct but since everyone can submit findings it's more or less reliable.

Other services providers + social media platforms

  • Facebook
  • PushTalk / PalTalk
  • MySpace
  • Google Inc. alias Alphabet
  • Amazon
  • Microsoft
  • Apple
  • Wikipedia, well it's for all
  • Automattic, Inc
  • LLC
  • Yahoo
  • Twitter (FBI records)
  • [Cookie based tracking](NSA uses advertisers’ cookies to track specific web browsers - report)

Government mass surveillance

Discontinued

  • U.S. Terrorist Surveillance Program
  • Multistate Anti-Terrorism Information Exchange (MATRIX)
  • ThinThread
  • Trailblazer Project

European Union

  • Data Retention Directive
  • INDECT
  • Schengen Information System

Australia

  • Status: unclear, needs confirmation + evidence

China

  • Golden Shield Project
  • Monitoring Bureau -> Status: unclear, needs confirmation + evidence
  • Public Information Network Security -> Status: unclear, needs confirmation + evidence

France

  • Frenchelon

Germany

  • Nachrichtendienstliches Informationssystem
  • Project 6
  • RAMPART-A with BND / NSA (needs more evidence)

India

  • Central Monitoring System (CMS)
  • DRDO NETRA
  • NATGRID

Russia

  • SORM
  • Yarovaya Law
  • other systems rumored - Status: unclear, needs confirmation + evidence

Sweden

  • Titan traffic database
  • X-Keyscore

Switzerland

  • Onyx

United Kingdom

  • Impact Nominal Index
  • Interception Modernisation Programme
  • Mastering the Internet (MTI)
  • UK National DNA Database (NDNAD)
  • Tempora
  • Royal Concierge

United States

  • Boundless Informant (needs confirmation)
  • BULLRUN
  • Carnivore
  • Comprehensive National Cybersecurity Initiative
  • DCSNet
  • Fairview
  • Financial Crimes Enforcement Network
  • ICREACH
  • Magic Lantern (needs confirmation)
  • Main Core
  • MAINWAY
  • Media monitoring services
  • MUSCULAR
  • MYSTIC
  • Nationwide Suspicious Activity Reporting Initiative
  • NSA ANT catalog
  • PRISM
  • Room 641A via AT&T
  • Sentry Eagle
  • Special Collection Service
  • Stellar Wind (code name)
  • Tailored Access Operations
  • Terrorist Finance Tracking Program
  • Turbulence (NSA)
  • US Intelligence Community (IC)
  • Utah Data Center
  • X-Keyscore

Possible Iran (unconfirmed + needs proof)

  • GhostNet
  • Stuxnet

Spying programs

  • Traceroute "Packaged Goods" / "Treasure Map"
  • VOIP: Hammerchant
  • WEALTHYCLUSTER
  • APEX
  • COMSAT
  • IRRITANT HORN (hijacks Google Play Store contained apps)
  • HACIENDA

Thanks goes to everyone who are fighting for www. security! Give spying no chance!

You can’t perform that action at this time.