Use the amazing StevenBlack/hosts Adblock Lists with dnsmasqd or unbound on your router
To grab the latest list (default: adware + malware + fakenews) run the update.sh script
Example
$ ./update.sh
--2017-02-18 09:09:57-- https://raw.githubusercontent.com/StevenBlack/hosts/master/alternates/fakenews/hosts
Resolving raw.githubusercontent.com (raw.githubusercontent.com)... 151.101.112.133
Connecting to raw.githubusercontent.com (raw.githubusercontent.com)|151.101.112.133|:443... connected.
HTTP request sent, awaiting response... 200 OK
Length: 1021501 (998K) [text/plain]
Saving to: ‘hosts.txt’
2017-02-18 09:09:58 (2.38 MB/s) - ‘hosts.txt’ saved [1021501/1021501]
44006 Entries processed..
5 Whitelist Hosts processed..
10493 Domains total..
1. Copy the dist/dnsmasq.adblock.conf file to a persistent location (e.g. /etc or /jffs/etc on WRT Routers)
2. Add the following directive to your dnsmasq.conf file
conf-file=/etc/dnsmasq.adblock.conf
3. Restart dnsmasq
4. You're Ready!
1. Copy the dist/unbound.adblock.conf file to a persistent location (e.g. /etc or /jffs/etc on WRT Routers)
2. Add the following directive to your unbound.conf file into server section
server:
...
include: /etc/unbound.adblock.conf
3. Restart unbound
4. You're Ready!
Add a bunch of hostnames which should not getting blocked. Wildcards are supported using leading dot
Example
analytics.google.com
.twitter.com
mydommain.tld
.mywildcarddomain.tld
The Script is OpenSource and licensed under the Terms of The MIT License (X11) - your're welcome to contribute