A General Overview

Real Time

Ads and trackers are instantly detected within 3 ms to provide the fastest and optimized experience.

Statistics

Provides a real-time statistical analysis of the attempted connections to see who is trying to use your data.

Secure

The system is run locally so no data is able to be collected and anti-DNS leak protection is enabled to ensure no one is snooping.

Reliability

Instantly and accurately able to stop 99.9% of all ads and trackers from establishing a connection.

Programmed And Implemented With

Programmed with Java, Lombok, Spring Web, Spring Security, Spring Data, JavaScript and HTML.

Purpose

Designed to prevent companies the ability to track and show ads, which makes them money. Ensures that only the things you want to see are available and able to be accessed on your computer.

Effectiveness

Utilizes the most up-to-date and enterprise level software to ensure the most reliable, user-friendly and effective product possible.

How Does It Block Ads?

This program creates a local DNS (Domain Name Service) server that runs on port 53 (127.0.0.1:53) that monitors all attempted inbound and outbound connections. Then will send a blackhole request if the site is an ad or tracker. So the connection was never established.

How Is It Multi-OS?

It is able to run on multiple operating systems because all operating systems need to utilize DNS servers. Because the program was programmed as a Java program, it can run on all systems that can install Java on it. In order to work on a router, it is needed to be installed on a system that supports the program and then the router’s DNS settings need to be changed to the local IP address of the computer running it. For example: 10.0.0.23.

Why Is There An Ad List?

There is an ad list to ensure that you can add and remove all ads that you want blocked. The ad list is stored on your local system because this program was designed to only be run on the local system.

Why Does This Program Use DNS?

The program uses DNS because all incoming requests will be seen and processed by the computer. Because of this, a DNS receiver is created that intercepts the requests and compares them with the allowed/denied connections. If the connection is not allowed, it will be rejected and if it is allowed, the requests will be sent to the specified DNS server of your choice (default: 8.8.8.8).