Unblock the web

RSS Feed


unblock.us.org is a new approach to fighting online censorship.

It uncensors the web by using the same tools that oppressive governments use to censor it in the first place.

Try it

Change your DNS server to That’s all. You might have to restart your computer or flush your browser cache before the changes are effective, but it’s usually instant.

If it asks for a secondary server, leave it empty. Here’s a decent guide on how to change your DNS server in Windows 7.

Advanced users can also choose to enter an IPv6 address: 2a01:7e00::f03c:91ff:feae:e96e.

Other servers:
– Located in the US (Beta)


How can a DNS server even deal with IP bans?

A normal DNS server is worthless against IP bans. However, unblock.us.org will hijack domains blocked in oppressive countries and then tunnel your data like a VPN. You should notice very little speed difference. It works for both HTTP and HTTPS.

In the case of encrypted data, unblock.us.org can’t decrypt or modify it because we don’t have the keys, so your data is safe. Both encrypted and unencrypted data is only tunneled and its contents never inspected. There’s no IP logs and nothing other than basic traffic and error stats is ever written to a hard drive.


How is it different from a VPN?

A VPN will tunnel ALL your data through its servers on an encrypted link. They offer very good protection, but good VPN servers aren’t free. If you have access to a good VPN server you can trust, we suggest you use that instead.

Unblock.us.org only tunnels data for IP banned websites. It won’t add nor remove any encryption layers, it basically doesn’t change anything, apart from unblocking some censored websites.


How is it different from Tor?

Tor will route all your data through a complex anonymizing network. It’s very slow. Unblock.us.org will only re-route traffic that would be blocked by your oppressive government, nothing else. It’s also very fast compared to Tor. It’s almost impossible to tell the speed difference compared to normal, censored web browsing.



It only unblocks web pages, so if your country were to block Dropbox, you’d have to use Tor or a VPN to unblock it.

It won’t work on Windows XP, because it needs SSL SNI support.


  • On April 10, 2014 at 8:20 pm dageek said

    Simple and without any bad intentions: ¿Who you are? and ¿Why should we trust you?


    • On April 10, 2014 at 8:31 pm admin said

      I’m a Canadian software engineering student. You don’t have to trust me, the code is open source and it should take less than 10 minutes to install your own server! Also, keep in mind that it’s impossible to decrypt or tamper encrypted data and hijacking the SSL certificate will trigger many browser security errors. Unencrypted data can unfortunately be tampered by EVERY SINGLE HOP between you and the destination server. That’s normally way upwards of 20 routers around the world you have to trust whenever you connect to a single site using HTTP. This service is not even reading the contents of HTTP requests (apart from the HTTP headers), but you should still consider all unencrypted data you send on the internet to be potentially compromised already.


      • On April 10, 2014 at 11:25 pm Christian Bundy said

        To be fair, there’s no way of knowing whether or not you’re running the code that you published. 😉


        • On April 12, 2014 at 5:18 pm geeknik said

          To be fair, he published the code so you could run your own server if you don’t trust his. =)


  • On April 10, 2014 at 8:58 pm ahmet alp balkan said

    How secure it is? How can I trust my non-SSL communication will not be intercepted and my passwords won’t be stolen? Who is maintaining this service? Where is your privacy policy and usage terms?

    I would trust Tor even though it’s slow. It’s not dead-slow. It’s doing an OK job.


    • On April 10, 2014 at 9:08 pm admin said

      Like I said to dageek already, there’s nothing I can do to prove without any doubt that I’m not intercepting non-SSL traffic. The code that deals with that sort of traffic is all open source (nginx) and all the nginx settings I use are public as well. Don’t forget that any unencrypted traffic on the internet should be considered compromised already considering that any host between you and the server can affect it.

      You’re right about publishing a privacy policy and usage terms, I need to do that right now.


  • On April 10, 2014 at 10:44 pm TheDude said

    This is awesome man! Thank you so much!


  • On April 10, 2014 at 11:11 pm foo said



  • On April 10, 2014 at 11:34 pm Greg Slepak said

    Wow, great work! Very nice! It’s especially nice to see another NodeJS + CoffeeScript DNS server! 🙂

    I’m working on DNSChain as part of the okTurtles project, and it’s using a fork of tjfontaine’s wonderful native-dns module for all the DNS stuff.

    I saw that you seem to have implemented your own low-level DNS layer, is that so? Would you be interested in combining our efforts together to make improvements to the native-dns fork? ‘rakoo’ has already helped us by adding DANE support to it (for the TLSA record type).

    Thanks for making this, very clever use of DNS for another good cause.


    • On April 10, 2014 at 11:42 pm admin said

      Thanks! Yeah, I wrote a low-level (very) partial support of DNS. It only supports the few features I needed for this project. node-dns looks very interesting, it’s the kind of project that I’d like to integrate to this one. Which fork is the recommended one with all the latest patches and the most support?


  • On April 11, 2014 at 12:36 am fannet said

    What happens when they block your DNS server?


    • On April 11, 2014 at 1:46 am admin said

      VPN traffic and VPN providers aren’t even seriously targeted in pretty much every oppressive country I can think of. The authorities know that there’ll always be a way to pass data through short of scealing the whole country off the internet. The goal is to lower the entrance cost by making a service that combines the speed of VPNs with the no cost aspect of Tor and is easier to setup than both of them.

      If it ever gets enough traction to end up on some government’s radar (and keep in mind that VPNs and Tor are hugely popular and mostly left alone), then I’m sure enough people will running their own servers with the code I open sourced to mitigate that.


      • On April 11, 2014 at 1:48 am Greg Slepak said

        It would be interesting to potentially merge this work with DNSChain btw. That would result in greater coverage (more servers = more difficult to censor). You have my contact info.


  • On April 11, 2014 at 1:46 am Greg Slepak said

    You find another one. That’s the beauty of open source software. 😉


    • On April 11, 2014 at 1:46 am Greg Slepak said

      Err, that reply was meant for @fannet.


    • On April 11, 2014 at 1:49 am admin said

      Exactly! Especially with IPv6, the whack-a-mole game becomes very unfavorable to the government.


  • On April 11, 2014 at 9:26 am someone said

    For https why not redirect to http ?


  • On April 11, 2014 at 4:26 pm Shiz said


    I am trying to use it from Pakistan on a macbook. Even though terminal shows that your dns is in effect, I still can’t get around block sites i.e youtube.com

    Any idea?

    Pakistani goverenment is lazy as fk so I don’t think they have blocked this DNS.


    • On April 11, 2014 at 4:34 pm admin said

      Are you on Linux or Mac? if so, enter “dig youtube.com” in your terminal. It should reply with something like “ IN A”. On Windows, the command is “nslookup youtube.com” and it should return “”. If that works, go to https://youtube.com and let me know what kind of error message you get, if any. Right now, unblock.us.org is used by a few dozen people in Turkey and is tuned for the Turkish way of blocking the web. I’m sure with your help it won’t be hard to figure out how the Pakistani one does it, so unblock.us.org becomes more powerful.


      • On April 11, 2014 at 6:02 pm Shiz said

        It does show this in terminal which means its working fine probably?

        ;youtube.com. IN A

        ;; ANSWER SECTION:
        youtube.com. 4 IN A

        When I try to open youtube it takes me to the usual block page which government uses for censorship.

        This is the ip which I see in status bar when trying to load youtube.

        I would love to help you making this work for pakistani users because to be honest, I am sick of using VPNs and having to route all the traffic through VPNs. I have paid plan but they make internet so slow its hard to use.

        Do you have an email? Would be easier to do this on email.

        Thanks for help.


        • On April 11, 2014 at 7:33 pm Greg Slepak said

          My guess is that they’re simply reading the contents of the traffic and seeing that it says “YouTube” everywhere (or something similar). 😛

          Did you try HTTPS? They might be able to block that too though by checking the certificate that’s passed in the handshake. My recommendation would be to have an HTTPS connection to this DNS server and send everything over that.


  • On November 23, 2014 at 7:42 am Faisal Hameed said

    I did it and find it awesome.
    how to get back ….
    i mean how to set original DNS IP address


    • On January 7, 2015 at 10:05 pm admin said

      Just set it back to Automatic in your DNS settings.


Leave a Reply

Your email address will not be published. Required fields are marked *