Ad-blocking
   HOME

TheInfoList



OR:

Ad blocking or ad filtering is a
software Software is a set of computer programs and associated software documentation, documentation and data (computing), data. This is in contrast to Computer hardware, hardware, from which the system is built and which actually performs the work. ...
capability for blocking or altering
online advertising Online advertising, also known as online marketing, Internet advertising, digital advertising or web advertising, is a form of marketing and advertising which uses the Internet to promote products and services to audiences and platform users. ...
in a
web browser A web browser is application software for accessing websites. When a user requests a web page from a particular website, the browser retrieves its files from a web server and then displays the page on the user's screen. Browsers are used o ...
, an application or a network. This may be done using browser extensions or other methods.


Technologies and native countermeasures

Online advertising exists in a variety of forms, including
web banner A web banner or banner ad is a form of advertising on the World Wide Web delivered by an ad server. This form of online advertising entails embedding an advertisement into a web page. It is intended to attract traffic to a website by linkin ...
s,
pictures An image is a visual representation of something. It can be two-dimensional, three-dimensional, or somehow otherwise feed into the visual system to convey information. An image can be an artifact, such as a photograph or other two-dimensiona ...
, animations, embedded audio and video, text, or pop-up windows, and can even employ audio and video
autoplay AutoPlay, a feature introduced in Windows 98, examines newly discovered removable media and devices and, based on content such as pictures, music or video files, launches an appropriate application to play or display the content. It is closely re ...
. Many browsers offer some ways to remove or alter advertisements: either by targeting technologies that are used to deliver ads (such as embedded content delivered through
browser plug-in A browser extension is a small software module for customizing a web browser. Browsers typically allow a variety of extensions, including user interface modifications, cookie management, ad blocking, and the custom scripting and styling of web p ...
s or via
HTML5 HTML5 is a markup language used for structuring and presenting content on the World Wide Web. It is the fifth and final major HTML version that is a World Wide Web Consortium (W3C) recommendation. The current specification is known as the HTML ...
), targeting URLs that are the source of ads, or targeting behaviors characteristic to ads (such as the use of HTML5 AutoPlay of both audio and video).


Prevalence

Use of mobile and desktop ad blocking software designed to remove traditional advertising grew by 41% worldwide and by 48% in the U.S. between Q2 2014 and Q2 2015. As of Q2 2015, 45 million Americans were using ad blockers. In a survey research study released Q2 2016, Met Facts reported 72 million Americans, 12.8 million adults in the UK, and 13.2 million adults in France were using ad blockers on their PCs, smartphones, or tablet computers. In March 2016, the
Internet Advertising Bureau The Internet Advertising Bureau UK (IAB UK) is the industry body for digital advertising in the United Kingdom, founded in 1997. It promotes a sustainable future for digital advertising and best practice for advertisers, agencies, and media owne ...
reported that UK ad blocking was already at 22% among people over 18 years old. As of 2021, 27% of US Internet users used ad blocking software, with continued increasing trend since 2014. Among technical audiences the rate of blocking reaches 58% as of 2021.


Reasons for blocking ads

There are various fundamental reasons why one would want to use ad-blocking: * Protecting privacy **Reduces the number of HTTP cookies,
browser fingerprinting A device fingerprint or machine fingerprint is information collected about the software and hardware of a remote computing device for the purpose of identification. The information is usually assimilated into a brief identifier using a fingerprinti ...
and other aggressive behavioral tracking techniques * Protecting from malvertising **Any intrusive actions from the ads, including but not limited to:
drive-by downloads Drive-by download is of two types, each concerning the unintended download of computer software from the Internet: # Authorized drive-by downloads are downloads which a person has authorized but without understanding the consequences (e.g. down ...
, invisible overlay click areas (such as a regular link that opens an unexpected external website), opening in a new tab, popups and auto-redirects. * Saving bandwidth (and by extension, money) **On most websites user tracking and advertising code alone constitutes the majority of the downloadable content, thus significantly inflating the amount of data downloaded by the user ("web bloat") * Better user experience ** Some ads cover the text making it partly illegible, making the site unusable ** Less cluttered pages ** Faster page loading times ** Fewer distractions * Accessibility reasons ** The motion in some ads is nauseating for some users * Save battery on
mobile device A mobile device (or handheld computer) is a computer small enough to hold and operate in the hand. Mobile devices typically have a flat LCD or OLED screen, a touchscreen interface, and digital or physical buttons. They may also have a physica ...
s or laptops * Prevent undesirable websites from making ad revenue out of the user's visit Publishers and their representative trade bodies, on the other hand, argue that web ads provide revenue to website owners, which enable the website owners to create or otherwise purchase content for the website. Publishers state that the prevalent use of ad blocking software and devices could adversely affect website owner revenue and thus, in turn, lower the availability of free content on websites.


Benefits

For users, the benefits of ad blocking software include quicker loading and cleaner looking web pages with fewer
distraction Distraction is the process of diverting the attention of an individual or group from a desired area of focus and thereby blocking or diminishing the reception of desired information. Distraction is caused by: the lack of ability to pay attentio ...
s, lower resource waste (bandwidth, CPU, memory, etc.), and privacy benefits gained through the exclusion of the
tracking Tracking may refer to: Science and technology Computing * Tracking, in computer graphics, in match moving (insertion of graphics into footage) * Tracking, composing music with music tracker software * Eye tracking, measuring the position of t ...
and profiling systems of ad delivery platforms. Blocking ads can also save substantial amounts of electrical energy and lower users' power bills, and additional energy savings can also be expected at the grid level because fewer data packets need to be transmitted between the user's machine and the website server.


User experience

Ad blocking software may have other benefits to users'
quality of life Quality of life (QOL) is defined by the World Health Organization as "an individual's perception of their position in life in the context of the culture and value systems in which they live and in relation to their goals, expectations, standards ...
, as it decreases Internet users' exposure to advertising and marketing industries, which promote the purchase of numerous consumer products and services that are potentially harmful or unhealthy and on creating the urge to buy immediately. The average person sees more than 5000 advertisements daily, many of which are from online sources. Ads may promise viewers that their lives will be improved by purchasing the item that is being promoted (e.g., fast food, soft drinks,
candy Candy, also called sweets (British English) or lollies (Australian English Australian English (AusE, AusEng, AuE, AuEng, en-AU) is the set of varieties of the English language native to Australia. It is the country's common language an ...
, expensive
consumer electronics Consumer electronics or home electronics are electronic (analog or digital) equipment intended for everyday use, typically in private homes. Consumer electronics include devices used for entertainment, communications and recreation. Usually r ...
) or encourages users to get into debt or
gamble Gambling (also known as betting or gaming) is the wagering of something of value ("the stakes") on a random event with the intent of winning something else of value, where instances of strategy are discounted. Gambling thus requires three elem ...
. Additionally, if Internet users buy all of these items, the packaging and the containers (in the case of candy and soda pop) end up being disposed of, leading to negative environmental impacts of waste disposal. Advertisements are very carefully crafted to target weaknesses in human psychology; as such, a reduction in exposure to advertisements could be beneficial for users' quality of life. Unwanted advertising can also harm the advertisers themselves if users become annoyed by the ads. Irritated users might make a conscious effort to avoid the goods and services of firms which are using annoying "pop-up" ads which block the Web content the user is trying to view. For users not interested in making purchases, the blocking of ads can also save time. Any ad that appears on a website exerts a toll on the user's "attention budget" since each ad enters the user's field of view and must either be consciously ignored or closed, or dealt with in some other way. A user who is strongly focused on reading solely the content that they are seeking likely has no desire to be diverted by advertisements that seek to sell unneeded or unwanted goods and services. In contrast, users who are actively seeking items to purchase, might appreciate advertising, in particular targeted ads.


Security

Another important aspect is improving security; online advertising subjects users to a higher risk of infecting their devices with
computer virus A computer virus is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code. If this replication succeeds, the affected areas are then said to be "infected" with a compu ...
es than surfing pornography
website A website (also written as a web site) is a collection of web pages and related content that is identified by a common domain name and published on at least one web server. Examples of notable websites are Google Search, Google, Facebook, Amaz ...
s. In a high-profile case, malware was distributed through advertisements provided to
YouTube YouTube is a global online video platform, online video sharing and social media, social media platform headquartered in San Bruno, California. It was launched on February 14, 2005, by Steve Chen, Chad Hurley, and Jawed Karim. It is owned by ...
by a malicious customer of
Google Google LLC () is an American multinational technology company focusing on search engine technology, online advertising, cloud computing, computer software, quantum computing, e-commerce, artificial intelligence, and consumer electronics. ...
's
Doubleclick DoubleClick Inc. was an advertisement company that developed and provided Internet ad serving services from 1995 until its acquisition by Google in March 2008. DoubleClick offered technology products and services that were sold primarily to adv ...
. In August 2015, a 0-day exploit in the Firefox browser was discovered in an advertisement on a website. When Forbes required users to disable ad blocking before viewing their website, those users were immediately served with pop-under malware. The
Australian Signals Directorate Australian Signals Directorate (ASD), formerly the Defence Signals Directorate (DSD) is the federal statutory agency in the Australian Government responsible for foreign signals intelligence, support to military operations, cyber warfare, and ...
recommends individuals and organizations block advertisements to improve their
information security Information security, sometimes shortened to InfoSec, is the practice of protecting information by mitigating information risks. It is part of information risk management. It typically involves preventing or reducing the probability of unauthorize ...
posture and mitigate potential malvertising attacks and machine compromise. The information security firm
Webroot Webroot Inc. is an American privately-held cybersecurity software company that provides Internet security for consumers and businesses. The company was founded in Boulder, Colorado, US, and is now headquartered in Broomfield, Colorado, and h ...
also notes employing ad blockers provide effective countermeasures against malversating campaigns for less technically sophisticated computer users.


Monetary

Ad blocking reduces page load time and saves bandwidth for the users. Users who pay for total transferred bandwidth ("capped" or pay-for-usage connections) including most mobile users worldwide have a direct financial benefit from filtering an ad before it is loaded. Using an ad blocker is a common method of improving internet speeds. Analysis of the 200 most popular news sites (as ranked by
Alexa Alexa may refer to: Technology *Amazon Alexa, a virtual assistant developed by Amazon * Alexa Internet, a defunct website ranking and traffic analysis service * Arri Alexa, a digital motion picture camera People *Alexa (name), a given name and ...
) in 2015 showed that
Mozilla Firefox Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation. It uses the Gecko rendering engine to display web pages, which implements current and a ...
Tracking Protection lead to 39% reduction in data usage and 44% median reduction in page load time. According to research performed by ''
The New York Times ''The New York Times'' (''the Times'', ''NYT'', or the Gray Lady) is a daily newspaper based in New York City with a worldwide readership reported in 2020 to comprise a declining 840,000 paid print subscribers, and a growing 6 million paid ...
'', ad blockers reduced data consumption and sped upload time by more than half on 50 news sites, including ''The New York Times'' itself. Journalists concluded that "visiting the home page of Boston.com (the site with most ad data in the study) every day for a month would cost the equivalent of about $9.50 in data usage just for the ads". It is a known problem with most web browsers, including
Firefox Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation. It uses the Gecko rendering engine to display web pages, which implements current and ...
, that restoring sessions often plays multiple embedded ads at once. However, this annoyance can easily be averted simply by setting the web browser to clear all cookies and browsing-history information each time the browser software is closed. Another preventive option is to use a script blocker, which enables the user to disable all scripts and then to selectively re-enable certain scripts as desired, in order to determine the role of each script. The user thus can very quickly learn which scripts are truly necessary (from the standpoint of webpage functionality) and consequently which sources of scripts are undesirable, and this insight is helpful in visiting other websites in general. Thus by precisely controlling which scripts are run in each webpage viewed, the user retains full control over what happens on their computer CPU and computer screen.


Methods

One method of filtering is simply to block (or prevent auto play of)
Flash animation Adobe Flash animation or Adobe Flash cartoon (formerly Macromedia Flash animation, Macromedia Flash cartoon, FutureSplash animation, and FutureSplash cartoon) is an animation that is created with the Adobe Animate (formerly Flash Professional) p ...
or image loading or
Microsoft Windows Windows is a group of several proprietary graphical operating system families developed and marketed by Microsoft. Each family caters to a certain sector of the computing industry. For example, Windows NT for consumers, Windows Server for serv ...
audio and video files. This can be done in most browsers easily and also improves security and privacy. This crude technological method is refined by numerous browser extensions. Every
web browser A web browser is application software for accessing websites. When a user requests a web page from a particular website, the browser retrieves its files from a web server and then displays the page on the user's screen. Browsers are used on ...
handles this task differently, but, in general, one alters the options, preferences or application extensions to filter specific media types. An additional add-on is usually required to differentiate between ads and non-ads using the same technology, or between wanted and unwanted ads or behaviors. The more advanced ad-blocking filter software allows fine-grained control of
advertisements Advertising is the practice and techniques employed to bring attention to a product or service. Advertising aims to put a product or service in the spotlight in hopes of drawing it attention from consumers. It is typically used to promote a ...
through features such as
blacklist Blacklisting is the action of a group or authority compiling a blacklist (or black list) of people, countries or other entities to be avoided or distrusted as being deemed unacceptable to those making the list. If someone is on a blacklist, t ...
s,
whitelist A whitelist, allowlist, or passlist is a mechanism which explicitly allows some identified entities to access a particular privilege, service, mobility, or recognition i.e. it is a list of things allowed when everything is denied by default. It is ...
s, and
regular expression A regular expression (shortened as regex or regexp; sometimes referred to as rational expression) is a sequence of characters that specifies a search pattern in text. Usually such patterns are used by string-searching algorithms for "find" or ...
filters. Certain security features also have the effect of disabling some ads. Some
antivirus software Antivirus software (abbreviated to AV software), also known as anti-malware, is a computer program used to prevent, detect, and remove malware. Antivirus software was originally developed to detect and remove computer viruses, hence the nam ...
can act as an ad blocker. Filtering by intermediaries such as
ISP An Internet service provider (ISP) is an organization that provides services for accessing, using, or participating in the Internet. ISPs can be organized in various forms, such as commercial, community-owned, non-profit, or otherwise private ...
providers or national governments is increasingly common.


Browser integration

As of 2015, many web browsers block unsolicited
pop-up ad Pop-up ads or pop-ups are forms of online advertising on the World Wide Web. A pop-up is a graphical user interface (GUI) display area, usually a small window, that suddenly appears ("pops up") in the foreground of the visual interface. The pop-u ...
s automatically. Current versions of
Konqueror Konqueror is a free and open-source web browser and file manager that provides web access and file-viewer functionality for file systems (such as local files, files on a remote FTP server and files in a disk image). It forms a core part of ...
,
Microsoft Edge Microsoft Edge is a proprietary, cross-platform web browser created by Microsoft. It was first released in 2015 as part of Windows 10 and Xbox One and later ported to other platforms as a fork of Google's Chromium open-source project: Android ...
, and
Firefox Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation. It uses the Gecko rendering engine to display web pages, which implements current and ...
also include content filtering support out-of-the-box. Content filtering can be added to
Firefox Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation. It uses the Gecko rendering engine to display web pages, which implements current and ...
, Chromium-based browsers,
Opera Opera is a form of theatre in which music is a fundamental component and dramatic roles are taken by singers. Such a "work" (the literal translation of the Italian word "opera") is typically a collaboration between a composer and a librett ...
,
Safari A safari (; ) is an overland journey to observe wild animals, especially in eastern or southern Africa. The so-called "Big Five" game animals of Africa – lion, leopard, rhinoceros, elephant, and Cape buffalo – particularly form an importa ...
, and other browsers with extensions such as
AdBlock AdBlock is an ad blocking browser extension for Google Chrome, Apple Safari (desktop and mobile), Firefox, Opera, and Microsoft Edge. AdBlock allows users to prevent page elements, such as advertisements, from being displayed. It is free to do ...
,
Adblock Plus Adblock Plus (ABP) is a free and open-source browser extension for content-filtering and ad blocking. It is developed by developer Wladimir Palant's Eyeo GmbH, a German software company. The extension has been released for Mozilla Firefox ( ...
, and
uBlock Origin uBlock Origin (; "" ) is a free and open-source browser extension for content filtering, including ad blocking. The extension is available for Chrome, Chromium, Edge, Firefox, Opera, Pale Moon, as well as versions of Safari prior to 13 ...
, and a number of sources provide regularly updated filter lists. Adblock Plus is included in the freeware browser
Maxthon Maxthon (, formerly named ''MyIE2'') is a freeware web browser, created by JeffChen in Singapore. It is available for Windows, macOS, Linux, and as ''Maxthon Mobile'' for Android, iOS, and Windows Phone 8. Since version 6 Maxthon is based on Chr ...
from the
People's Republic of China China, officially the People's Republic of China (PRC), is a country in East Asia. It is the world's most populous country, with a population exceeding 1.4 billion, slightly ahead of India. China spans the equivalent of five time zones and ...
by default. Another method for filtering advertisements uses
Cascading Style Sheets Cascading Style Sheets (CSS) is a style sheet language used for describing the presentation of a document written in a markup language such as HTML or XML (including XML dialects such as SVG, MathML or XHTML). CSS is a cornerstone techno ...
(CSS) rules to hide specific
HTML The HyperText Markup Language or HTML is the standard markup language for documents designed to be displayed in a web browser. It can be assisted by technologies such as Cascading Style Sheets (CSS) and scripting languages such as JavaScri ...
and
XHTML Extensible HyperText Markup Language (XHTML) is part of the family of XML markup languages. It mirrors or extends versions of the widely used HyperText Markup Language (HTML), the language in which Web pages are formulated. While HTML, prior ...
elements. This was once handled directly by a browser's user style sheet and custom CSS files. The CSS files employed regular expressions to describe a general advertisement profile. An example CSS selector from the once popular Floppy Moose (2003) style sheet is below. It simply hides anything with a link containing the characters "ad." A:link REF*="ad." IMG Stylesheets are still used to block ads today. However they are almost always used by an ad-blocking extension that combines CSS with other techniques. AdBlock Plus syntax includes CSS selectors which they call "element hiding" rules. The newer uBlock origin even allows "cosmetic filters" which inject custom CSS declarations. Due to changes in advertising techniques, modern ad-blockers use more specific selectors, more frequently updated selectors, and a greater quantity of selectors. For example, the Floppy Moose style sheet originally contained 40 lines of CSS. In 2022, Easylist contains thousands of CSS selectors. In contrast to the general example above, below is one of the many specific CSS selectors from Easylist (2022). a ref^="https://topoffers.com/"href*="/?pid="] In January 2016, Brave (web browser), Brave, a free, ad-blocking browser for Mac, PC, Android, and iOS devices was launched. Brave users can optionally enable Brave's own ad network to earn
Basic Attention Token Brave is a free and open-source web browser developed by Brave Software, Inc. based on the Chromium web browser. Brave is a privacy-focused browser, which automatically blocks online advertisements and website trackers in its default settings. ...
s (BATs), a type of cryptocurrency, which can be sent as micro-payments to publishers. At the beginning of 2018, Google confirmed that the built-in ad blocker for the Chrome/
Chromium Chromium is a chemical element with the symbol Cr and atomic number 24. It is the first element in group 6. It is a steely-grey, lustrous, hard, and brittle transition metal. Chromium metal is valued for its high corrosion resistance and hardne ...
browsers would go live on 15 February: this ad blocker only blocks certain ads as specified by the ''Better Ads Standard'' (defined by the Coalition for ''Better Ads'', in which Google itself is a board member). This built-in ad blocking mechanism is disputed because it could unfairly benefit Google's advertising itself. In 2019, both
Apple An apple is an edible fruit produced by an apple tree (''Malus domestica''). Apple fruit tree, trees are agriculture, cultivated worldwide and are the most widely grown species in the genus ''Malus''. The tree originated in Central Asia, wh ...
and Google began to make changes to their web browsers' extension systems which encourage the use of declarative content blocking using pre-determined filters processed by the web browser, rather than filters processed at runtime by the extension. Both vendors have imposed limits on the number of entries that may be included in these lists, which have led to (especially in the case of Chrome) allegations that these changes are being made to inhibit the effectiveness of ad blockers.


External programs

A number of external software applications offer ad filtering as a primary or additional feature. A traditional solution is to customize an
HTTP proxy The Hypertext Transfer Protocol (HTTP) is an application layer protocol in the Internet protocol suite model for distributed, collaborative, hypermedia information systems. HTTP is the foundation of data communication for the World Wide Web, ...
(or web proxy) to filter content. These programs work by caching and filtering content before it is displayed in a user's browser. This provides an opportunity to remove not only ads but also content that may be offensive, inappropriate, or even malicious (
Drive-by download Drive-by download is of two types, each concerning the unintended download of computer software from the Internet: # Authorized drive-by downloads are downloads which a person has authorized but without understanding the consequences (e.g. down ...
). Popular proxy software which blocks content effectively include
Netnanny Net Nanny is a content-control software suite marketed primarily towards parents as a way to monitor and control their child's computer and phone activity. Features The original version of Net Nanny released in 1994 was a web browser that could f ...
,
Privoxy Privoxy is a free non- caching web proxy with filtering capabilities for enhancing privacy, manipulating cookies and modifying web page data and HTTP headers before the page is rendered by the browser. Privoxy is a "privacy enhancing proxy", fil ...
,
Squid True squid are molluscs with an elongated soft body, large eyes, eight arms, and two tentacles in the superorder Decapodiformes, though many other molluscs within the broader Neocoleoidea are also called squid despite not strictly fitting t ...
, and some
content-control software An Internet filter is software that restricts or controls the content an Internet user is capable to access, especially when utilized to restrict material delivered over the Internet via the Web, Email, or other means. Content-control software det ...
. The main advantage of the method is freedom from implementation limitations (browser, working techniques) and centralization of control (the proxy can be used by many users). Proxies are very good at filtering ads, but they have several limitations compared to browser-based solutions. For proxies, it is difficult to filter
Transport Layer Security Transport Layer Security (TLS) is a cryptographic protocol designed to provide communications security over a computer network. The protocol is widely used in applications such as email, instant messaging, and voice over IP, but its use in securi ...
(SSL) (https://) traffic and full webpage context is not available to the filter. As well, proxies find it difficult to filter
JavaScript JavaScript (), often abbreviated as JS, is a programming language that is one of the core technologies of the World Wide Web, alongside HTML and CSS. As of 2022, 98% of Website, websites use JavaScript on the Client (computing), client side ...
-generated ad content.


Hosts file and DNS manipulation

Most
operating system An operating system (OS) is system software that manages computer hardware, software resources, and provides common services for computer programs. Time-sharing operating systems schedule tasks for efficient use of the system and may also in ...
s, even those which are aware of the
Domain Name System The Domain Name System (DNS) is a hierarchical and distributed naming system for computers, services, and other resources in the Internet or other Internet Protocol (IP) networks. It associates various information with domain names assigned to ...
(DNS), still offer
backward compatibility Backward compatibility (sometimes known as backwards compatibility) is a property of an operating system, product, or technology that allows for interoperability with an older legacy system, or with input designed for such a system, especially i ...
with a locally administered list of foreign hosts. This configuration, for historical reasons, is stored in a flat text file that by default contains very few hostnames and their associated
IP address An Internet Protocol address (IP address) is a numerical label such as that is connected to a computer network that uses the Internet Protocol for communication.. Updated by . An IP address serves two main functions: network interface ident ...
es. Editing this hosts file is simple and effective because most DNS clients will read the local hosts file before querying a remote
DNS server A name server refers to the server component of the Domain Name System (DNS), one of the two principal namespaces of the Internet. The most important function of DNS servers is the translation (resolution) of human-memorable domain names (example. ...
. Storing black-hole entries in the hosts file prevents the browser from accessing an ad server by manipulating the name resolution of the ad server to a local or nonexistent IP address (127.0.0.1 or 0.0.0.0 are typically used for IPv4 addresses). While simple to implement, these methods can be circumvented by advertisers, either by hard-coding, the IP address of the server that hosts the ads (this, in its turn, can be worked around by changing the local routing table by using for example
iptables iptables is a user-space utility program that allows a system administrator to configure the IP packet filter rules of the Linux kernel firewall, implemented as different Netfilter modules. The filters are organized in different tables, which ...
or other blocking firewalls), or by loading the advertisements from the same server that serves the main content; blocking name resolution of this server would also block the useful content of the site. Using a
DNS sinkhole A DNS sinkhole, also known as a sinkhole server, Internet sinkhole, or Blackhole DNS is a DNS server that has been configured to hand out non-routable addresses for a certain set of domain names. Computers that use the sinkhole fail to access the r ...
by manipulating the hosts file exploits the fact that most operating systems store a file with IP address, domain name pairs which is consulted by most browsers before using a DNS server to look up a domain name. By assigning the
loopback address In computer networking, localhost is a hostname that refers to the current device used to access it. It is used to access the network services that are running on the host via the loopback network interface. Using the loopback interface bypasses a ...
to each known
ad server Ad serving describes the technology and service that places advertisements on Web sites, mobile apps, and Connected TVs. Ad serving technology companies provide software to Web sites and advertisers to serve ads, count them, choose the ads th ...
, the user directs traffic intended to reach each
ad server Ad serving describes the technology and service that places advertisements on Web sites, mobile apps, and Connected TVs. Ad serving technology companies provide software to Web sites and advertisers to serve ads, count them, choose the ads th ...
to the local machine or to a virtual black hole of
/dev/null In some operating systems, the null device is a device file that discards all data written to it but reports that the write operation succeeded. This device is called /dev/null on Unix and Unix-like systems, NUL: (see TOPS-20) or NUL on CP/M an ...
or
bit bucket In computing jargon, the bit bucket (or byte bucket) is where lost computerized data has gone, by any means; any data which does not end up where it is supposed to, being lost in transmission, a computer crash, or the like, is said to have g ...
.


DNS filtering

Advertising can be blocked by using a DNS server which is configured to block access to domains or hostnames which are known to serve ads by spoofing the address. Users can choose to use an already modified DNS server or set up a dedicated device running adequate software such as a
Raspberry Pi Raspberry Pi () is a series of small single-board computers (SBCs) developed in the United Kingdom by the Raspberry Pi Foundation in association with Broadcom. The Raspberry Pi project originally leaned towards the promotion of teaching basic ...
running
Pi-hole Pi-hole is a Linux network-level advertisement and Internet tracker blocking application which acts as a DNS sinkhole and optionally a DHCP server, intended for use on a private network. It is designed for low-power embedded devices with network ...
themselves. Manipulating DNS is a widely employed method to manipulate what the end-user sees from the Internet but can also be deployed locally for personal purposes. China runs its own root DNS and the EU has considered the same.
Google Google LLC () is an American multinational technology company focusing on search engine technology, online advertising, cloud computing, computer software, quantum computing, e-commerce, artificial intelligence, and consumer electronics. ...
has required their
Google Public DNS Google Public DNS is a Domain Name System (DNS) service offered to Internet users worldwide by Google. It functions as a recursive name server. Google Public DNS was announced on December 3, 2009, in an effort described as "making the web faster ...
be used for some applications on its Android devices. Accordingly, DNS addresses/domains used for advertising may be extremely vulnerable to a broad form of ad substitution whereby a domain that serves ads is entirely swapped out with one serving more local ads to some subset of users. This is especially likely in countries, notably
Russia Russia (, , ), or the Russian Federation, is a List of transcontinental countries, transcontinental country spanning Eastern Europe and North Asia, Northern Asia. It is the List of countries and dependencies by area, largest country in the ...
,
India India, officially the Republic of India (Hindi: ), is a country in South Asia. It is the seventh-largest country by area, the second-most populous country, and the most populous democracy in the world. Bounded by the Indian Ocean on the so ...
and
China China, officially the People's Republic of China (PRC), is a country in East Asia. It is the world's most populous country, with a population exceeding 1.4 billion, slightly ahead of India. China spans the equivalent of five time zones and ...
, where advertisers often refuse to pay for clicks or page views. DNS-level blocking of domains for non-commercial reasons is already common in China.


Recursive Local VPN

On Android, apps can run a local
VPN A virtual private network (VPN) extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. The be ...
connection with its own host filtering ability and DNS address without requiring root access. This approach allows ad blocking app to download ad blocking host files and use them to filter out ad networks throughout the device.
AdGuard Developed by AdGuard Software Limited, AdGuard offers open-source, free, and shareware products. AdGuard's DNS app supports Microsoft Windows, Linux, macOS, Android and iOS. AdGuard is also available as a browser extension. AdGuard Soft ...
, Blokada, DNS66, and RethinkDNS are few of the popular apps which accomplish ad blocking without root permission. The ad blocking is only active when the local VPN is turned on, and it completely stops when the VPN connection is disconnected. The convenience makes it easy to access content blocked by anti-adblock scripts. This approach optimizes battery usage, reduces internet slowdown caused by using external DNS or VPN ad blocking and needs overall less configuration.


Hardware devices

Devices such as AdTrap or
Pi-hole Pi-hole is a Linux network-level advertisement and Internet tracker blocking application which acts as a DNS sinkhole and optionally a DHCP server, intended for use on a private network. It is designed for low-power embedded devices with network ...
use hardware to block Internet advertising. Based on reviews of AdTrap, this device uses a
Linux Linux ( or ) is a family of open-source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991, by Linus Torvalds. Linux is typically packaged as a Linux distribution, which ...
Kernel Kernel may refer to: Computing * Kernel (operating system), the central component of most operating systems * Kernel (image processing), a matrix used for image convolution * Compute kernel, in GPGPU programming * Kernel method, in machine learnin ...
running a version of PrivProxy to block ads from
video streaming Video on demand (VOD) is a media distribution system that allows users to access videos without a traditional video playback device and the constraints of a typical static broadcasting schedule. In the 20th century, broadcasting in the form of o ...
,
music streaming A music streaming service is a type of streaming media service that focuses primarily on music, and sometimes other forms of digital audio content such as podcasts. These services are usually subscription-based services allowing users to stream d ...
, and any web browser, while PiHole act as local DNS to block advertisement servers, stopping connected devices from showing most ads. Another such solution is provided for network-level ad blocking for telcos by Israeli startup Shine.


By external parties and internet providers

Internet providers, especially mobile operators, frequently offer proxies designed to reduce network traffic. Even when not targeted specifically at ad filtering, these proxy-based arrangements will block many types of advertisements that are too large or bandwidth-consuming, or that are otherwise deemed unsuited for the specific internet connection or target device. Many internet operators block some form of advertisements while at the same time injecting their own ads promoting their services and specials.


Economic consequences for online business

Some content providers have argued that widespread ad blocking results in decreased revenue to a website sustained by advertisements and
e-commerce E-commerce (electronic commerce) is the activity of electronically buying or selling of products on online services or over the Internet. E-commerce draws on technologies such as mobile commerce, electronic funds transfer, supply chain manageme ...
-based businesses, where this blocking can be detected. Some have argued that since advertisers are ultimately paying for ads to increase their own revenues, eliminating ad blocking would only dilute the value per impression and drive down the price of advertising, arguing that like
click fraud Click, Klick and Klik may refer to: Airlines * Click Airways, a UAE airline * Clickair, a Spanish airline * MexicanaClick, a Mexican airline Art, entertainment, and media Fictional characters * Klick (fictional species), an alien race in the g ...
, impressions served to users who use ad blockers are of little to no value to advertisers. Consequently, they argue, eliminating ad blocking would not increase overall ad revenue to content providers in the long run.


Business models

Tools that help block ads have to work on different business models to stay in operation: * Free and open source: Several tools work under a
FOSS Fos or FOSS may refer to: Companies *Foss A/S, a Danish analytical instrument company * Foss Brewery, a former brewery in Oslo, Norway *Foss Maritime, a tugboat and shipping company Historic houses * Foss House (New Brighton, Minnesota), United ...
model, powered by community contributions and donations, e.g.
uBlock Origin uBlock Origin (; "" ) is a free and open-source browser extension for content filtering, including ad blocking. The extension is available for Chrome, Chromium, Edge, Firefox, Opera, Pale Moon, as well as versions of Safari prior to 13 ...
* Whitelisting: Companies have resorted to maintaining a whitelist against a share of the ad revenue to allow "acceptable ads". This has faced criticism, such as
Adblock Plus Adblock Plus (ABP) is a free and open-source browser extension for content-filtering and ad blocking. It is developed by developer Wladimir Palant's Eyeo GmbH, a German software company. The extension has been released for Mozilla Firefox ( ...
* Subscription/Upfront: Some companies in this field have started a subscription or upfront payment model for the tools, e.g. Wipr * Freemium: Other companies offer some level of service for free while charge for additional features, e.g.
AdGuard Developed by AdGuard Software Limited, AdGuard offers open-source, free, and shareware products. AdGuard's DNS app supports Microsoft Windows, Linux, macOS, Android and iOS. AdGuard is also available as a browser extension. AdGuard Soft ...


Response from publishers


Countermeasures

Some websites have taken countermeasures against ad blocking software, such as attempting to detect the presence of ad blockers and informing users of their views, or outright preventing users from accessing the content unless they disable the ad blocking software, whitelist the website, or buy an "ad-removal pass". There have been several arguments supporting and opposing the assertion that blocking ads is wrong. Indeed, there is evidence to show that these countermeasures may hurt a website's
SEO Seo or SEO may refer to: * Search engine optimization, the process of improving the visibility of a website or a web page in search engines Organisations * SEO Economic Research, a scientific institute * Spanish Ornithological Society (''Socied ...
performance, as users unwilling to turn off their AdBlock, may instead go to a competitor's website listed in the search results. Due to the little amount of time the user spends on the website, and the greater time spent on a competitor's, search engines may view the webpage less favourably and reduce its search ranking. The back-and-forth elevation of technologies used for ad-blocking and countering ad-blocking have been equated to an "ad blocking war" or "arms race" between all parties. It has been suggested that in the
European Union The European Union (EU) is a supranational political and economic union of member states that are located primarily in Europe. The union has a total area of and an estimated total population of about 447million. The EU has often been des ...
, the practice of websites scanning for ad blocking software may run afoul of the E-Privacy Directive. This claim was further validated by IAB Europe's guidelines released in June 2016 stating that there indeed may be a legal issue in ad blocker detection. While some anti-blocking stakeholders have tried to refute this it seems safe to assume that Publishers should follow the guidelines provided by the main Publisher lobby IAB. The joint effort announced by IAB Sweden prior to IAB Europe's guideline on the matter never materialized, and would have most likely been found against European anti-competition laws if it did. In August 2017, a vendor, Admiral, of such counter-measures issued a demand under section 1201 of the U.S.
Digital Millennium Copyright Act The Digital Millennium Copyright Act (DMCA) is a 1998 United States copyright law that implements two 1996 treaties of the World Intellectual Property Organization (WIPO). It criminalizes production and dissemination of technology, devices, or s ...
, to demand the removal of a
domain name A domain name is a string that identifies a realm of administrative autonomy, authority or control within the Internet. Domain names are often used to identify services provided through the Internet, such as websites, email services and more. As ...
associated with their service from an ad-blocking filter list. The vendor argued that the domain constituted a component of a technological protection measure designed to protect a copyrighted work, and thus made it a violation of
anti-circumvention Anti-circumvention refers to laws which prohibit the circumvention of technological barriers for using a digital good in certain ways which the rightsholders do not wish to allow. The requirement for anti-circumvention laws was globalized in 1996 ...
law to frustrate access to it.


Alternatives

As of 2015, advertisers and marketers look to involve their brands directly into the entertainment with
native advertising Native advertising, also called sponsored content, is a type of advertising that matches the form and function of the platform upon which it appears. In many cases it functions like an advertorial, and manifests as a video, article or editorial. ...
and
product placement Product placement, also known as embedded marketing, is a marketing technique where references to specific brands or products are incorporated into another work, such as a film or television program, with specific promotional intent. Much of th ...
(also known as brand integration or embedded marketing). An example of product placement would be for a soft drink manufacturer to pay a
reality TV Reality television is a genre of television programming that documents purportedly unscripted real-life situations, often starring unfamiliar people rather than professional actors. Reality television emerged as a distinct genre in the early 19 ...
show producer to have the show's cast and host appear onscreen holding cans of the soft drink. Another common product placement is for an
automotive manufacturer The automotive industry comprises a wide range of companies and organizations involved in the design, development, manufacturing, marketing, and selling of motor vehicles. It is one of the world's largest industries by revenue (from 16 % such a ...
to give free cars to the producers of a
TV show A television show – or simply TV show – is any content produced for viewing on a television set which can be broadcast via over-the-air, satellite, or cable, excluding breaking news, advertisements, or trailers that are typically placed betw ...
, in return for the show's producer depicting characters using these vehicles during the show. Some digital publications turned to their customers for help as a form of
tip jar A tip jar, also known as a tip cup is a container, commonly a glass jar, into which customers can put a gratuity. A tip jar is usually situated at the point-of-sale at many businesses. Although common in many countries around the world, tip jars i ...
. For example, ''
The Guardian ''The Guardian'' is a British daily newspaper. It was founded in 1821 as ''The Manchester Guardian'', and changed its name in 1959. Along with its sister papers ''The Observer'' and ''The Guardian Weekly'', ''The Guardian'' is part of the Gu ...
'' is asking its readers for donations to help offset falling advertising revenue. According to the newspaper's editor-in-chief, Katharine Viner, the newspaper gets about the same amount of money from membership and donations as it does from advertising. The newspaper considered preventing readers from accessing its content if usage of ad-blocking software becomes widespread, but so far it keeps the content accessible for readers who employ ad-blockers. A new service called Scroll, launched in January 2020, worked with several leading website publishers to create a subscription model for ad-free browsing across all supported websites. Users would pay Scroll directly, and portions of the subscription fees are doled out to the websites based on proportional view count.


See also

*
Adware Adware, often called advertising-supported software by its developers, is software that generates revenue for its developer by automatically generating online advertisements in the user interface of the software or on a screen presented to the ...
*
Adversarial information retrieval Adversarial information retrieval (adversarial IR) is a topic in information retrieval related to strategies for working with a data source where some portion of it has been manipulated maliciously. Tasks can include gathering, indexing, filtering ...
*
Content-control software An Internet filter is software that restricts or controls the content an Internet user is capable to access, especially when utilized to restrict material delivered over the Internet via the Web, Email, or other means. Content-control software det ...
*
Criticism of advertising Advertising is a form of selling a product to a certain audience in which communication is intended to persuade an audience to purchase products, ideals or services regardless of whether they want or need them. While advertising can be seen as a ...
*
Content filter An Internet filter is software that restricts or controls the content an Internet user is capable to access, especially when utilized to restrict material delivered over the Internet via the Web, Email, or other means. Content-control software dete ...
*
Commercial skipping Commercial skipping is a feature of some digital video recorders that makes it possible to automatically skip commercials in recorded programs. This feature created controversy, with major television networks and movie studios claiming it violates ...
*
DNSBL A Domain Name System blocklist, Domain Name System-based blackhole list, Domain Name System blacklist (DNSBL) or real-time blackhole list (RBL) is a service for operation of mail servers to perform a check via a Domain Name System (DNS) query whe ...
*
Hosts file filtering The computer file hosts is an operating system file that maps hostnames to IP addresses. It is a plain text file. Originally a file named HOSTS.TXT was manually maintained and made available via file sharing by Stanford Research Institute for the ...
*
Malvertising Malvertising (a portmanteau of "malicious software (malware) advertising") is the use of online advertising to spread malware. It typically involves injecting malicious or malware-laden advertisements into legitimate online advertising networks ...
*
Privacy Privacy (, ) is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively. The domain of privacy partially overlaps with security, which can include the concepts of a ...
* Proxomitron


References

{{Reflist Advertising-free media Anti-spam Online advertising Promotion and marketing communications