# Tracking JS Blocklist
- Formats
* [URL-based](#url-based)
* [URL-based (Vivaldi)](#url-based-vivaldi)
* [Plain URL](#plain-url)
- [Compressed version](#compressed-version)
- [See also](#see-also)
- [FAQ and Guides](#faq-and-guides)
- [CI Variables](#ci-variables)
- [License](#license)
A blocklist of javascript links (or webpages with javascript) that perform [browser fingerprinting](https://en.wikipedia.org/wiki/Web_tracking). The original data set is collected by DuckDuckGo's [Tracker Radar](https://github.com/duckduckgo/tracker-radar) project. Blocklist is updated on the first day of the month.
The list contains **all** the links that Tracker Radar detected to have browser fingerprinting, there is no further processing to remove false positive.
- uBlock Origin (uBO) -> [URL-based](#url-based) section
- AdGuard browser extension -> [URL-based](#url-based) section
- Vivaldi -> [URL-based (Vivaldi)](#url-based-vivaldi) section
- [Plain URL](#plain-url) - original links without filter syntax
Check out my other filters:
- [urlhaus-filter](https://gitlab.com/malware-filter/urlhaus-filter)
- [phishing-filter](https://gitlab.com/malware-filter/phishing-filter)
- [pup-filter](https://gitlab.com/malware-filter/pup-filter)
- [vn-badsite-filter](https://gitlab.com/malware-filter/vn-badsite-filter)
## URL-based
Import the following URL into uBO/AdGuard to subscribe:
- https://malware-filter.gitlab.io/malware-filter/tracking-filter.txt
Mirrors
- https://curbengh.github.io/malware-filter/tracking-filter.txt
- https://curbengh.github.io/tracking-filter/tracking-filter.txt
- https://malware-filter.gitlab.io/tracking-filter/tracking-filter.txt
- https://malware-filter.pages.dev/tracking-filter.txt
- https://tracking-filter.pages.dev/tracking-filter.txt
## URL-based (Vivaldi)
_Requires Vivaldi Desktop/Android 3.3+, blocking level must be at least "Block Trackers"_
Import the following URL into Vivaldi's **Tracker Blocking Sources** to subscribe:
- https://malware-filter.gitlab.io/malware-filter/tracking-filter-vivaldi.txt
Mirrors
- https://curbengh.github.io/malware-filter/tracking-filter-vivaldi.txt
- https://curbengh.github.io/tracking-filter/tracking-filter-vivaldi.txt
- https://malware-filter.gitlab.io/tracking-filter/tracking-filter-vivaldi.txt
- https://malware-filter.pages.dev/tracking-filter-vivaldi.txt
- https://tracking-filter.pages.dev/tracking-filter-vivaldi.txt
## Plain URL
A list of URLs without any filter syntax.
- https://malware-filter.gitlab.io/malware-filter/tracking-data.txt
Mirrors
- https://curbengh.github.io/malware-filter/tracking-data.txt
- https://curbengh.github.io/tracking-filter/tracking-data.txt
- https://malware-filter.gitlab.io/tracking-filter/tracking-data.txt
- https://malware-filter.pages.dev/tracking-data.txt
- https://tracking-filter.pages.dev/tracking-data.txt
## Compressed version
All filters are also available as gzip- and brotli-compressed.
Gzip: https://malware-filter.gitlab.io/malware-filter/tracking-filter.txt.gz
Brotli: https://malware-filter.gitlab.io/malware-filter/tracking-filter.txt.br
## See also
- [DuckDuckGo Browser Extension](https://github.com/duckduckgo/duckduckgo-privacy-extension) supports more advanced features like script surrogate and CNAME uncloak.
- [Blokada version](https://blokada.org/blocklists/ddgtrackerradar/standard/hosts.txt) can block more tracking domains but with more false positives. [More details](https://community.blokada.org/t/introducing-duckduckgo-tracker-radar-to-blokada/469)
## FAQ and Guides
See [wiki](https://gitlab.com/malware-filter/malware-filter/-/wikis/home)
## CI Variables
Optional variables:
- `CLOUDFLARE_BUILD_HOOK`: Deploy to Cloudflare Pages.
- `NETLIFY_SITE_ID`: Deploy to Netlify.
## License
[src/](src/): [CC0 1.0](LICENSE.md)
filters: [CC BY-NC-SA 4.0](https://creativecommons.org/licenses/by-nc-sa/4.0/)
DuckDuckGo Tracker Radar data: [CC BY-NC-SA 4.0](https://creativecommons.org/licenses/by-nc-sa/4.0/)
This repository is not endorsed by DuckDuckGo.