EBLOCKER pro, family User Manual

Page 1
17.10.2017
Page 1 of 81
User Manual
eBlocker GmbH
All rights reserved. Errors and omissions reserved
eBlocker GmbH | Kaiser-Wilhelm-Str. 47 | 20355 Hamburg | Germany
Page 2
17.10.2017
Page 2 of 81
Index
Introduction.............................................................................................................................................. 5
1.1 The eBlocker Products ................................................................................................................ 6
2 Commissioning ................................................................................................................................ 7
3 Activation ......................................................................................................................................... 8
4 Use eBlocker optimally .................................................................................................................... 9
4.1 Summary ..................................................................................................................................... 9
4.2 Deleting cookies, cache and browsing history ............................................................................ 9
4.3 Activate support for HTTPS/SSL encrypted connections ........................................................... 9
4.4 Activate exceptions for apps ....................................................................................................... 9
4.5 Final recommendation ................................................................................................................. 9
5 If something may not work ............................................................................................................ 11
5.1 Connection- and network problems .......................................................................................... 11
5.2 A website is not displayed ......................................................................................................... 11
5.3 The eBlocker icon does not displayed on all devices ............................................................... 13
5.4 The eBlocker icon is not showing on any device ...................................................................... 14
5.5 Removing common problems ................................................................................................... 14
5.6 Some apps don’t work ............................................................................................................... 15
5.7 The eBlocker completely stopped operating ............................................................................. 16
5.8 More help: Our forum and support ............................................................................................ 16
6 Tips and Tricks .............................................................................................................................. 16
6.1 The individual setup – eBlocker overtaking the DHCP server .................................................. 16
6.2 Inserting the eBlocker certificate ............................................................................................... 17
6.2.1 macOS .................................................................................................................................. 17
6.2.2 Windows ................................................................................................................................ 22
6.2.3 Android .................................................................................................................................. 30
6.2.4 iOS ........................................................................................................................................ 30
7 Definition of eBlocker functions ..................................................................................................... 33
7.1 eBlocker icon ............................................................................................................................. 33
7.2 eBlocker controlbar ................................................................................................................... 33
7.3 Dashboard ................................................................................................................................. 34
7.4 Tracker and Ads (Tracker- and Ad-Blocker) ............................................................................. 34
7.5 Anon (IP-Anonymization) .......................................................................................................... 36
7.6 Cloaking .................................................................................................................................... 36
7.7 Pause ........................................................................................................................................ 37
7.8 Settings ..................................................................................................................................... 37
7.9 Help ........................................................................................................................................... 38
Page 3
17.10.2017
Page 3 of 81
8 The eBlocker settings .................................................................................................................... 38
8.1 General ...................................................................................................................................... 39
8.1.1 License .................................................................................................................................. 39
8.1.2 Updates ................................................................................................................................. 39
8.1.3 Admin-Password ................................................................................................................... 39
8.2 Parental Control (beta) .............................................................................................................. 40
8.2.1 Activate Parental Control ...................................................................................................... 40
8.2.2 User and Protection profiles .................................................................................................. 40
8.2.3 Three easy steps ................................................................................................................... 41
8.2.4 Create a new user ................................................................................................................. 41
8.2.5 Change settings of a user ..................................................................................................... 42
8.2.6 Remove User ........................................................................................................................ 43
8.2.7 Create new profile ................................................................................................................. 43
8.2.8 Deny access to categories of websites ................................................................................. 45
8.2.9 Restrict internet access to certain time slots a day ............................................................... 46
8.2.10 Limit the maximum Internet usage per day ........................................................................... 46
8.2.11 Assign a user to device ......................................................................................................... 47
8.2.12 Controlbar for users with protection profiles ......................................................................... 48
8.2.13 What happens if the daily internet usage time is limited? ..................................................... 49
8.2.14 What happens if the internet access is denied? ................................................................... 50
8.2.15 Add own lists to the Blacklists ............................................................................................... 52
8.2.16 Add whitelists to blacklist categories ..................................................................................... 54
8.2.17 Add own whitelist categories ................................................................................................. 55
8.2.18 Change of user through controlbar ....................................................................................... 56
8.2.19 Migration of Parental Control to eBlockerOS 1.0 .................................................................. 58
8.3 Devices ...................................................................................................................................... 58
8.3.1 Devices – General ................................................................................................................. 59
8.3.2 Devices - General - Name ..................................................................................................... 59
8.3.3 Devices - General - Activate eBlocker .................................................................................. 59
8.3.4 Devices - General - Enable SSL ........................................................................................... 59
8.3.5 Devices - General - Activate eBlocker icon ........................................................................... 59
8.3.6 Devices – Anonymization ...................................................................................................... 60
8.3.7 Devices – Messages ............................................................................................................. 61
8.3.8 Devices - Discover new devices or remove devices from the list ......................................... 61
8.4 SSL ............................................................................................................................................ 62
8.4.1 Define exemptions for end-to-end encryption ....................................................................... 63
8.5 Apps .......................................................................................................................................... 64
8.6 Set up and use the Tor network ................................................................................................ 65
Page 4
17.10.2017
Page 4 of 81
8.7 Set up alternative VPN network ................................................................................................ 67
8.8 System ...................................................................................................................................... 70
8.8.1 Reboot and Shutdown ........................................................................................................... 70
8.8.2 Time zone and language ....................................................................................................... 71
8.8.3 Events ................................................................................................................................... 71
8.8.4 Diagnostics report ................................................................................................................. 71
8.8.5 Reset registration .................................................................................................................. 72
8.9 Network ..................................................................................................................................... 72
8.10 Advanced .................................................................................................................................. 74
8.10.1 DNS (beta) ............................................................................................................................ 74
8.10.2 WebRTC ................................................................................................................................ 74
8.10.3 HTTP Referrer Header .......................................................................................................... 74
8.10.4 Google Captive Portal Check ................................................................................................ 74
8.11 Expert Tools (beta) .................................................................................................................... 75
9 Quick guides.................................................................................................................................. 77
9.1 Delete cookies, cache and browsing history in browser ........................................................... 77
9.1.1 Firefox ................................................................................................................................... 77
9.1.2 Chrome .................................................................................................................................. 77
9.1.3 Internet Explorer .................................................................................................................... 77
10 Glossary .................................................................................................................................... 78
Appendix A Technical specifications (not valid for software licenses) ............................................. 80
Appendix B Safety notes .................................................................................................................. 80
Appendix C Manufacturer & copyright .............................................................................................. 80
Appendix D Technical support .......................................................................................................... 80
Page 5
17.10.2017
Page 5 of 81
Introduction
We are very pleased to know you are as concerned about your privacy as we are. We have been developing the eBlocker for more than three years in a team of experienced privacy and IT professionals. We still have a lot of ideas and are developing many more features that we are providing you monthly via updates. Thank you very much for supporting our idea of a free and private Internet by purchasing our eBlocker!
This manual explains all functions of eBlocker and will support you during commissioning. If there are still some questions left, please go to forum.eBlocker.com for answers and personal assistance.
Page 6
17.10.2017
Page 6 of 81
1.1 The eBlocker Products
The eBlocker is available in two versions: eBlocker Pro and eBlocker Family. Both versions are based on the same technical architecture and dont differentiate in their hardware. The difference is determined by their software, after activating the license.
Our eBlocker Pro is available already. The eBlocker Family that is based on eBlocker Pro is currently (December 2016) under development. We are planning to gradually provide all Family functions via updates till Q1 2017.
But whether eBlocker Pro or eBlocker Family: Now your privacy belongs to you again – and not to the Internet companies.
Page 7
17.10.2017
Page 7 of 81
2 Commissioning
By using this user manual, you will be able to set up your eBlocker in no time. Please follow the steps one by one and put your device in operation by instructed order. In only three steps your eBlocker is ready for use:
1. Connection First, connect your eBlocker to your router or switch, with the orange LAN cable.
Then connect your eBlocker with the adapter and the power supply.
Automatic configuration
Wait for 5 minutes until your eBlocker has automatically configured itself. Start an Internet browser and go to: http://setup.eblocker.com
Start
The eBlocker icon appears at the top right of your browser. With a click on the icon, you will be lead to the so called “controlbar”, in which you can read the most important information about the page you are currently visiting. You are able to customize the settings here.
The network link leads you to the network setup wizard. If the icon does not appear, you can find help in section 0.
Page 8
17.10.2017
Page 8 of 81
3 Activation
Please have your serial-number of your eBlocker as well as the license key and your email address ready for the activation.
Find the serial number on the type plate at the bottom of the package and at the bottom of the device. It has the format “SNXXXXXXXX”.
The license key is placed on the license card, which is included in the device packaging. Please use a valid email address in the activation process. If you want to transfer your eBlocker license to another device sometime, your email address will also be needed then.
Page 9
17.10.2017
Page 9 of 81
4 Use eBlocker optimally
4.1 Summary
After the activation process is done, we recommend you the following steps, so you can use eBlocker as optimal as possible:
Delete the cookies, cache and browsing history in all used browsers. Activate SSL (HTTPS-Support) in your eBlocker. Adopt eBlocker's certificate into your operating system and if necessary, in the browsers
with their own certificate store as described in section 6.2.
Activate possible exception lists for specific apps, so eBlocker can’t protect these apps
from third parties anymore.
You may define additional exceptions for encrypted connections (SSL) – for example, for
websites in which eBlocker should not be active, like online-banking sites.
Find all detailed steps explained in the following.
4.2 Deleting cookies, cache and browsing history
eBlocker automatically blocks all data collecting cookies or other elements that identify you. However, your browser has probably collected numerous tracking cookies of different providers
already. Therefore we recommend to delete all your cookies at first, so the trackers “can lose their track”.
You can read more about how to delete cookies in your respective browser in section 9.1.
4.3 Activate support for HTTPS/SSL encrypted connections
How you can activate support for HTTPS/SSL encrypted connections, we describe in section 8.4.
4.4 Activate exceptions for apps
How you can activate exceptions for apps, we describe in section 8.5.
4.5 Final recommendation
We have developed our eBlocker very carefully and are constantly improving it. Nevertheless, our eBlocker is no “magic pill” for privacy that works under all circumstances. Apps in particular which are installed in your device/OS natively, represent an increased risk for your privacy. Therefore we recommend to not use any apps at all if possible.
Apps are very common today for accessing Internet services. However, they involve a greater risk for your privacy, as when you use the same service through a browser. Why you should avoid apps to protect your privacy, we explain below:
Page 10
17.10.2017
Page 10 of 81
Attack into your privacy
Apps such as Facebook, WhatsApp or Twitter can have a direct access to your device and use their own communication protocols, which cannot be protected by your eBlocker.
Transfer of malware
Even the transfer of malicious software represents great danger. App stores do not only provide safe programs, but increasingly apps, that are infected with malware. These infected programs can transmit mobile data (e.g. contact details) unnoticed and without authorization or even send fee-based SMS to service numbers.
Use exceptions sparingly
Some apps are only compatible with eBlocker, if they are not monitored by eBlocker. Corresponding exception lists for these apps can be activated in the settings by clicking on “Apps. They will not be analyzed by Blocker anymore. Please note that your privacy heads to the danger zone with every exception you make. Data can be collected without you noticing it.
Page 11
17.10.2017
Page 11 of 81
5 If something may not work
Despite of the simple Plug & Play solution of eBlocker, some incompatibilities may appear that can have different causes. We have summarized some options below, which can help you in stressful times.
5.1 Connection- and network problems
Individual setup
Your eBlocker is setup in the automatic network mode by default with initial connection. This mode is compatible with most network devices. Should any connecting errors occur or your network slows down, you can setup your eBlocker individually with only a few clicks. By setting it up individually, all network problems will normally be resolved immediately. How you can setup your eBlocker individually, we describe in section 8.9.
5.2 A website is not displayed
If the eBlocker usually works but errors occur on certain websites, we have summarized some tips for help:
Pause eBlocker
Click on the eBlocker icon in the upper right corner of your browser window. With the "Pause" feature you can pause the eBlocker for a few minutes for the device you are using. Try to reload the according website afterwards. If the pause feature worked and you visit this website frequently, we recommend adding an exception for this website.
Add exceptions (Whitelisting)
If you cannot see a website or are blocked from viewing the website, you can add exceptions to this website. How to add these exceptions is described in chapter 8.4.1.
Deactivate SSL completely or for individual devices
In rare cases, it is possible that individual websites or apps that are loaded with HTTPS may not be compatible with the eBlocker. You can easily verify this by disabling SSL on the entire eBlocker or only for the current device.
To disable SSL completely open the eBlocker Controlbar. Go to Settings and then click "SSL". Deactivate SSL by clicking on the orange slide switch next to the "SSL Support" logo.
Page 12
17.10.2017
Page 12 of 81
To disable SSL only on a specific device, please follow these steps. Click Devices in the Settings menu. Search for the device on which you want to disable SSL. Your current device is displayed in bold type and is easy to identify.
Open the settings for the device by clicking on the appropriate line and deactivate SSL for the device with the slide switch shown.
Page 13
17.10.2017
Page 13 of 81
Disable SSL for individual websites or apps
If the problem has been solved by disabling SSL on the eBlocker, the corresponding website can be permanently added to an exception list.
First, check the Apps page to see if there is a predefined list of exceptions for the app and if the corresponding website appears in this list of exceptions. If so, activate the exception list with its switch.
Alternatively, you can also set the website as an exception. See Section 8.4.1 for more information on how to set exceptions for individual websites or manage exception lists.
5.3 The eBlocker icon does not displayed on all devices
If your eBlocker works fine in general, but the eBlocker icon is not showing on all devices, we have summarized some tips that can help.
Activate device
Open your browser window and click on the eBlocker icon. Go to Settings and then select Devices. On the right side you will see a list of all devices connected to the eBlocker in your home network. Check whether your device, its manufacturer or IP address is displayed. For information on how to activate your device, see section 8.3.3.
Display the eBlocker icon
Open your browser window and click on the eBlocker icon. Go to Settings and then select Devices. On the right side you will see a list of all devices connected to the eBlocker in your home network. Click on the IP address or its manufacturer and see if the eBlocker icon is displayed for your device. You can read how to activate or deactivate the eBlocker icon for a device in chapter 8.3.5.
Page 14
17.10.2017
Page 14 of 81
5.4 The eBlocker icon is not showing on any device
Reboot eBlocker
If you have connected your eBlocker for the first time and you have visited http://setup.eblocker.com but still no icon shows after 5 minutes waiting: reboot your eBlocker. Disconnect the device from the power supply and wait for 30 seconds. After 30 seconds connect your eBlocker to the power supply again.
Delete cookies and cache and reload website
Delete the cookies and cache of your browser or press and hold the shift key while clicking on browser icon „reload page“. You can read in section 4.1 how to delete cookies.
Please note that your eBlocker needs 5 minutes after initial connection to configure itself automatically.
Activate device
Make sure that your device appears under „Settings/Devices“ and is activated. How you can activate devices, is described in section 8.3. If your device is activated, but the icon is not showing, please read section 5.3.
5.5 Removing common problems
Plug in your cable correctly
Please check your scope of supply with your delivery. Make sure that your delivery is complete and check if you are really only using the accessory cable and the power supply. Test if the cables are plugged in correctly and fully inserted.
Plug in cable into the right ports
Please make sure that the LAN cable is really plugged into the „LAN“ port and the power supply is plugged into the “POWER” port. The „HDMI“ and “USB ports are for future enhancements and currently not in function.
Please note that some routers have limited LAN ports that cannot be used by the eBlocker. These port are LAN1 or LAN4/LAN5 most of the time. Please connect your eBlocker with one of the other ports of your router.
Reboot eBlocker
Open your browser and click on the eBlocker icon at the top right of your browser. Go to Settings and click on “System” afterwards.
Page 15
17.10.2017
Page 15 of 81
The button „Reboot and Shutdown“ is already highlighted in orange. Click on “Reboot” and your eBlocker will reboot itself.
If the eBlocker settings cannot be accessed, you can reboot your device by disconnecting your eBlocker from your power supply. Please wait for 30 seconds before reconnecting your device to the power supply.
Please note that your eBlocker needs 5 minutes to detect the network and configuring itself after rebooting.
Send diagnostic report to support team
In case of error or problems, you can create an automatic diagnostic report that you can send to us (section Appendix D). Through the diagnostic report, we will know in which state your device is in and thus a quick solution can be found.
Reboot router
Shut down your router and reboot it afterwards. Please consider the user manual of your router. Usually it only requires to disconnect the router from the power supply and connecting it right back in after a short time.
5.6 Some apps dont work
Unlike usual browsers, apps can have more access and possibilities on your device. While most browsers and sites work fine with your eBlocker, some incompatibilities with apps may occur. There may be problems with individual apps especially when your eBlocker is activated for encrypted connections (SSL). Usually the problems can be removed easily if the corresponding website that is communicating via SSL through an app, is excluded from the analysis by your eBlocker.
There are already prepared exception lists for some of the most common apps. You can find and activate them at “Settings/Apps“. You can also define your own exception list for more apps, or edit and complete the existing exception list.
It’s not always easy to find out which sites are actually addressed by the app. To facilitate the analysis, eBlocker provides an „Expert Tool“ to record and interpret the connection from app to website and makes suggestions as to which sites should be added to the exception list. This “Expert Tool” is described here 8.11.
But do not worry: if you are not an expert, please write a short article in our forum (forum.eblocker.com). Simply let us know which application or function of an app does not work with the eBlocker. Perhaps another member has solved exactly the same problem and can help you.
Page 16
17.10.2017
Page 16 of 81
Please note that you cannot be protected by your eBlocker on the website you are using the exception list for. Even if you are accessing the list with a web browser and not an app.
In connection to the subject of apps, please read our recommendations in section 4.5.
5.7 The eBlocker completely stopped operating
Please make sure to activate your DHCP server. Remove your eBlocker from your network and disconnect the eBlocker from the power supply. Now
remove all other devices (your computer, notebook, smartphone, etc.) from your network and connect them again to update the DHCP lease. You can also update your DHCP lease for most of the devices, in the network settings. Your devices are now connected to the Internet again.
Remove the network cable from your computer and deactivate the Wi-Fi, if needed. Connect the eBlocker with the network cable to your computer and connect the eBlocker to the power supply. Now wait for 5 minutes. Call the emergency-IP of the eBlocker: http://169.254.94.109:3000 to get to the eBlocker settings.
Go to „Network“ and set it to „automatic“. Save the settings afterwards. The eBlocker might reboot now. Wait for the reboot and go to the eBlocker settings again. Click on „system“ and shutdown your eBlocker. Remove the device from your computer and from the power supply. Don’t forget to
reconnect your computer to the network and/or to reactivate your Wi-Fi. Now connect your eBlocker to your router and to your power supply again.
5.8 More help: Our forum and support
Many useful answers to common questions can be found in our forum at http://forum.eBlocker.com
We are pleased to assist you via email as well (see Appendix D).
6 Tips and Tricks
6.1 The individual setup – eBlocker overtaking the DHCP server
Before you start, please make sure that your eBlocker is at least updated to the software version
0.9.3-8.
Find out how to deactivate the DHCP server of your router through the detailed information
in your router manual.
Click on “Network” in your eBlocker settings and go to the network assistant. Read the preparations carefully and click on the button “Next”. Read the process carefully and click on the button “Next”. Now please write down or print out the displayed settings. After doing so, click on the
button “Next”.
Confirm all three steps and click on “Perform and Reboot”.
Your eBlocker is fully configured after the reboot. Now your router is next to be converted.
Page 17
17.10.2017
Page 17 of 81
Log into your router as an administrator. You have to change the settings for some routers (e.g. from standard to extended). Deactivate the DHCP server of your router and save the settings. Finally renew the so called DHCP lease for all active client devices that are located in your
network (computer, notebook, smartphone, etc.).
It is important to renew the DHCP lease, so all client devices will not use the old network information. You will receive the new DHCP lease easily through disconnecting the network connection from the client devices, for example. Some devices also provide the button „Update DHCP lease“ in their network settings.
Note: If you want to undo this setting you have to activate the DHCP server in your router first.
Deactivate the DHCP server of your eBlocker afterwards or set your eBlocker to “automatic” in the
network settings.
6.2 Inserting the eBlocker certificate
We recommend our customers to add the eBlocker certificate into their operation system first. Most of the browsers and programs need to use the eBlocker certificate to have access to HTTPS sites. Several programs have their own certificate stores. How the eBlocker certificate is inserted into these certificate stores, we describe in this segment.
6.2.1 macOS
You have added the certificate with only a few clicks. Open the Safari browser. Open the eBlocker SSL configuration site. Click on the button add certificate, to save the eBlocker certificate.
Go to programs/applicationprograms and open the keychain Access application. Choose keychain system and the category certificate. Go to the menu and choose storage / import objects… . Choose the downloaded eBlocker certificate for the file dialog and click on open. You will eventually be asked to type the administration password. Double-click on the imported eBlocker certificate. Choose „always trust“ in the drop-down menu Secure Sockets Layer (SSL). Close the window. Type in the administrator password, if you are asked.
Page 18
17.10.2017
Page 18 of 81
The eBlocker certificate has now been added into macOS. Most of the browsers and programs can have access to the eBlocker certificate now.
Here a list of a few common browsers you can have access to the eBlocker controlbar on HTTPS sites with.
Safari Google Chrome Opera Vivaldi Yandex
The following browsers have their own certificate store. The eBlocker certificate has to be inserted into the according certificate store.
Firefox Cliqz (based on Firefox) Seamonkey Thunderbird (email program)
Firefox or Cliqz
Open the eBlocker SSL configuration site. Click on the button add certificate. Make sure that the first checkbox ‚Trust this CA to identify websites’ is selected (see image below).
Page 19
17.10.2017
Page 19 of 81
Click on OK to insert the eBlocker certificate in Firefox. You can see the eBlocker controlbar now on HTTPS sites with the Firefox or Cliqz browser.
Seamonkey
Go to edit and then to settings. Choose Privacy & Security and go to Certificates. Click on Manage Certificates. After the Certificate Manager opens, click on Import.
Choose the eBlocker certificate from the download directory and confirm with OK.
Page 20
17.10.2017
Page 20 of 81
Make sure the first checkbox ‚This certificate can identify websites‘ is selected and confirm this
process with OK.
Close the Certificate Manager and the settings with a click on the button OK. You can have access to the eBlocker controlbar on HTTPS sites now, with the Seamonkey browser.
Thunderbird (email program)
Go to the menu and click on Preferences.
Go to Advanced and click on View Certificates.
Page 21
17.10.2017
Page 21 of 81
After the Certificate Manager opens, click on import and choose the eBlocker certificate from the downloads directory.
Page 22
17.10.2017
Page 22 of 81
Open the eBlocker certificate and make sure that the first checkbox ‚Trust this CA to identify websites
is selected. Confirm with OK.
Confirm the Certificate Manager and the settings with OK. The certificate is now inserted into the Thunderbird email program.
6.2.2 Windows
You have inserted the certificate with only a few clicks. Please use the Microsoft Internet Explorer or the Edge browser.
Open the eBlocker SSL configuration site.
Page 23
17.10.2017
Page 23 of 81
Click on the button add certificate. After the dialog appears, go to save and then click on open.
Click on Install Certificate.
The Certificate Import Wizard opens. Click on Next. Go to safe all certificates into the following storage and click on browse afterwards.
Page 24
17.10.2017
Page 24 of 81
Choose the second register Trusted Root Certification Authorities and confirm this process with OK.
Page 25
17.10.2017
Page 25 of 81
Click on Next in the Certificate Import Wizard and confirm the process with Finish. Confirm the following safety warning with Yes. The eBlocker certificate is now inserted into Windows. Most of the browsers and programs can have
access to the eBlocker certificate. Here a list of a few common browsers you can have access to the eBlocker controlbar on HTTPS
sites with.
Microsoft Internet Explorer Microsoft Edge Google Chrome Opera Vivaldi Yandex
The following browsers have their own certificate store. The eBlocker certificate has to be inserted in the according certificate store.
Page 26
17.10.2017
Page 26 of 81
Firefox Cliqz (based on Firefox) Seamonkey Thunderbird (email program)
Firefox or Cliqz
Open the eBlocker SSL configuration site. Click on the button add certificate. Make sure that the first checkbox ‚Trust this CA to identify websites’ is selected (see image below).
Click on OK to insert the eBlocker certificate in Firefox. You can see the eBlocker controlbar now on HTTPS sites with the Firefox or Cliqz browser.
Seamonkey
Go to edit and then to settings. Choose Privacy & Security and go to Certificates. Click on Manage Certificates. After the Certificate Manager opens, click on Import.
Page 27
17.10.2017
Page 27 of 81
Choose the eBlocker certificate from the download directory and confirm with OK.
Make sure the first checkbox ‚Trust this CA to identify websites‘ is selected and confirm this process
with OK.
Close the Certificate Manager and the settings with a click on the button OK. You can have access to the eBlocker controlbar on HTTPS sites, with the Seamonkey browser.
Page 28
17.10.2017
Page 28 of 81
Thunderbird (email program)
Go to the menu and click on Options.
Go to Advanced and click on View Certificates.
Page 29
17.10.2017
Page 29 of 81
After the Certificate Manager opens, click on Import and choose the eBlocker certificate from the downloads directory.
Open the eBlocker certificate and make sure that the first checkbox ‚This certificate can identify websites‘ is selected. Confirm with OK.
Confirm the Certificate Manager and the settings with OK. The certificate is now inserted into the Thunderbird email program.
Page 30
17.10.2017
Page 30 of 81
6.2.3 Android
You have added the certificate with only a few clicks. Open the Google Chrome browser.
Open the eBlocker SSL configuration page. Click the button "Add certificate". Enter your PIN if necessary Give the certificate a name (for example: Tim eBlocker). Select "VPN and Apps" for credential use. Repeat the last steps and save the certificate at "Wi-Fi".
For Android versions smaller than version 6, it is sufficient to save the certificate only at "Wi-Fi".
If the eBlocker certificate is not opened automatically you can find it in your download folder.
6.2.4 iOS
You have added the certificate with only a few clicks. Open the iOS Safari browser.
Open the eBlocker SSL configuration page. Click the button "Add certificate". The iOS settings open automatically and the profile of the eBlocker certificate is displayed. Click on "Install". In the following dialog click on "Install" again. Confirm by clicking on "Install" for the last time again. The eBlocker certificate has now been added in iOS.
Page 31
17.10.2017
Page 31 of 81
Starting with the iOS version 10.3 the added eBlocker certificate has to be activated again.
Page 32
17.10.2017
Page 32 of 81
Open iOS Settings and navigate to "General" > "About" > "Certificate Trust Settings". There you will find the previously added eBlocker certificate that you can now activate.
Page 33
17.10.2017
Page 33 of 81
7 Definition of eBlocker functions
At daily use, you usually shouldn’t notice your eBlocker right away. Everything should work fine. A lot of sites will even load faster because advertisements and animations are blocked.
7.1 eBlocker icon
You can see if the eBlocker is working and activated by the orange translucent icon that is visible on the top right of every browser that you use.
If trackers or advertisements are blocked on the site, the total number of blocked requests will be displayed. Through a click on the eBlocker icon you can have access to the controlbar.
7.2 eBlocker controlbar
Through the controlbar you have quick access to the most important functions for the currently loaded page or for the device you are currently using.
You can read detailed information about the functions in the following sections.
Page 34
17.10.2017
Page 34 of 81
7.3 Dashboard
With a click on "Dashboard" you open the Dashbard of the eBlocker in a new browser tab.
The Dashboard lets you enable the pause function, view the SSL settings, get an overview of current system messages, and quickly access the eBlocker settings.
7.4 Tracker and Ads (Tracker- and Ad-Blocker)
One of the main and most important functions of the eBlocker is to prevent third parties from analyzing your surfing behavior and thus creating a detailed personality profile of you.
The eBlocker blocks the transmission of data to data collectors by default and prevents the loading of advertisements from advertising networks, that also log your surfing behavior and compress it to profiles.
The controlbar lets you can see how many connections to data collectors and advertising networks have been prevented on each page. By clicking on the "Tracker" and "Advertisement" icons, you can view the list of all blocked connections.
eBlocker wants to protect your privacy but the eBlocker does not try to avoid possible content blockings of the publishers. Websites such as bild. de for e.g., recognize that the eBlocker also blocks advertising and may no longer provide the requested content available for free.
By clicking on "Ads" on the controlbar, you can disable the eBlocker module to filter advertising either globally, or individually for this website and then have access to the content. You can reactivate filtering just as easy. The tracker blocker is still active, so you will continue to be protected from trackers. Be careful: even if the tracker blocker is active, advertising will capture your personality profile.
Page 35
17.10.2017
Page 35 of 81
Just like the module for filtering advertisements, the module for filtering trackers can be deactivated or activated globally, or individually for a website.
Page 36
17.10.2017
Page 36 of 81
7.5 Anon (IP-Anonymization)
Whenever you are on the Internet, you transmit your so-called IP address to the website you are visiting. It's kind of like the number transmission on the phone. There is no public "phonebook" for IP addresses, but your Internet provider knows who used which IP address and when. These data ­keyword "data retention" - are also stored for a period of time and, if necessary, passed on to the state authorities.
Regardless of this, each IP address can always be assigned to the provider and also to a geographical region.
To disguise your own IP address, i. e. to achieve additional anonymity on the Internet, you can activate the IP Anonymization”.
Once IP Anonymization is switched on, all HTTP requests are routed through an anonymization network. If SSL/HTTPS is activated on the eBlocker, HTTPS requests will also be anonymized. We are now able to support alternative networks with the OpenVPN protocol.
For information on how to set up and use the Tor network, see chapter 8.6. For information on how to set up and use other networks, see chapter 8.7
With "Check connection" you can check whether a connection via a Tor anonymizing network exists or which external data is visible.
With "Configure" you can directly go to the settings "IP Anonymization".
7.6 Cloaking
Each internet browser identifies itself with the so-called "User Agent" -identification. This identifier provides the website with precise information on the end device, operating system and browser used. It is not only used to identify you and to create a personality profile but it is also used by shops very often to offer individual prices. For e.g., if you use a tablet you will may get a different price for the same product as you would by using a stationary PC.
Page 37
17.10.2017
Page 37 of 81
You can use the “Device Cloaking feature of the eBlocker to cloak your device and cause the user agent ID of another device type to be sent. This allows you to further improve the protection of your privacy and ideally to take advantage from dynamic pricing in some shops.
Open the controlbar. Go to "Cloaking" and cloak your device with a click on the device you want be cloaked.
7.7 Pause
"Pause" deactivates the eBlocker for the current device you are currently surfing with on the Internet.
The eBlocker Dashboard opens in a new browser tab as soon as you click on "Pause" in the eBlocker Controlbar. You can extend the pause in the Dashboard by 5 minutes, end the pause, or access the eBlocker settings.
7.8 Settings
Click on „Settings“ to set up your eBlocker individually. Detailed information about the eBlocker functions are described in section 8.
Page 38
17.10.2017
Page 38 of 81
7.9 Help
For questions and issues you can have access to this user manual. Moreover you can go to our forum for technical matters, in which you can find many answers to common asked questions.
http://forum.eBlocker.com
We are also pleased to help you with further assistance via email (see Appendix D). Unfortunately we do not offer any support via telephone at the moment.
8 The eBlocker settings
You can find the main functions that you need for your daily routine in the net by clicking on the eBlocker icon (at the right top of every browser site) and through your controlbar (see 7).
Some settings can be adjusted easier and sometimes only through the so called console. You can have access to the setting console by clicking on the icon “Settings” after opening the controlbar (see
7.2).
The functions of the setting console are divided into following areas:
General  Devices  SSL  Apps  IP-Anonymization  System  Network  Experimental (beta)  Expert Tools (beta)
You can have access to the requested area by clicking on one of the captions listed on the side register, which you see on the left side.
You can find a detailed description for all areas in the following sections.
Page 39
17.10.2017
Page 39 of 81
If you have called the setting console for the first time or if you have not activated the update license yet, the network setting assistant will appear by default. The network setting assistant will guide you through the activation process.
8.1 General
General settings and information about your eBlocker. This site is divided into following sections:
License  Updates  Admin-Password  About
8.1.1 License
You can read details about your activation status of your license and of your eBlocker here.
By clicking on „Activate new license“ you can update your license (e.g. to lifetime license) or upgrade
your license (e.g. from eBlocker Pro to eBlocker Family). Please enter your license key for that.
The link „Buy license“ leads you to our eBlocker online shop. The link „Transfer license (from/to other device) leads you to a website where you can remove the
license off your device and use it for a different device.
8.1.2 Updates
This page shows you which versions of the eBlocker software and filter rules are currently in operation.
You can enable automatic updates, if you have activated a valid license for this device. You can also determine at what time these updates should be implemented.
Automatic updates are activated by default in the general settings and are implemented in your local time between 02:00 o’clock and 03:00 o‘clock.
If you deactivate the automatic updates, you can always import updates by yourself. The eBlocker will display a notice next to the "Check for update" button, as soon as a new update is available for you.
8.1.3 Admin-Password
The eBlocker console can be reached through the general settings in your local network, by default. In many cases this is sufficient and very practical.
However, we recommend to assign an administrator password, so that important settings and information of your eBlocker are only accessible after entering this password. Once a password has been assigned, your eBlocker console can only be accessed by entering this password.
Please keep the admin-password in safe hands! In case you forget your password or mislay it, you
can reset the password by clicking on the slide switch near the words “Administrator password is disabled”.
Page 40
17.10.2017
Page 40 of 81
You can find some general and legal basics as well as references to your eBlocker. You can also read about how to get in touch with our support forum (see Appendix D).
8.2 Parental Control (beta)
Parental Control of the eBlocker has been significantly extended in version 1.3.
If you have used Parental Control already in a previous version, please consider the hints in section
8.2.19
8.2.1 Activate Parental Control
To be able to use Parental Control, assign an administrator password first to prevent others from accessing the eBlocker settings and perhaps deactivating Parental Control.
Assign the administrator password in "eBlocker Settings> General", "Admin password".
Navigate to "eBlocker Settings > Parental Control". The section “Parental Control” is divided into four subpages. We describe the functions detailed in the following sections:
User User Profile Website Blacklists Website Whitelists
8.2.2 User and Protection profiles
In order to activate Parental Control for individual devices in your home network, all devices that should be protected must first be assigned to a user. This user will define the effective protection profile for the device. The protection profile then defined the access rules for the device. I.e. it defines, which websites are accessible or restricted and at which times and how long internet access is permitted.
New in release 1.3: The active user of a device - and thus the active protection profile - can now be changed at any time by entering a user PIN, so that a flexible use of the devices is possible.
Example 1:
Page 41
17.10.2017
Page 41 of 81
The family tablet is accessible to every family member, even children can use it at any time without the parent having to attend. Therefore, the tablet should be assigned to a user with a restricted protection profile to ensure maximum protection during unattended use. If a parent wants to use the tablet, the Parental Control protection can temporarily be changed or switched off by changing the user of the device. A PIN must be entered for the user change. Once the parent has finished using the device, the user should be reset to the original owne, or the Internet access for the device should be completely blocked.
Example 2: A parent's smartphone is always owned by that parent. It is also protected against unauthorized use by a system password. The children can never use this smartphone unattended. In this case, it is not necessary to assign an explicit user or a Protection profile to the device.
8.2.3 Three easy steps
The following steps must be carried out to activate Parental Control for your home network:
Create an eBlocker user for all family members (see section 8.2.4). Assign the appropriate protection profile to each user. The eBlocker provides sample
profiles that can be adapted to your needs. Or you can set up additonal protection profiles yourself (see section 8.2.7).
Assign a main user to all devices that should be protected by Parental Control (see section
8.2.11). It is possible to change the active user of a device at any time by entering an individual user PIN (see section 8.2.18).
8.2.4 Create a new user
Navigate to the “eBlocker Settings > Parental Control” and click on the page “User”.
If you have not used Parental Control yet, the list of users is empty. After you have created some users, the page might look like this:
To create a new user, click “Add User”. A dialog box (see below) opens. Enter a name and select a Protection profile. In addition, you should assign a PIN to all users who are allowed to use another device. For example, provide a PIN for all adults and the older children.
Page 42
17.10.2017
Page 42 of 81
Note that any user who has received a PIN can change their own PIN over the ControlBar (s. section
8.2.18). You can also view and change all other settings at any time.
8.2.5 Change settings of a user
Click on the name of a user. The current settings and details for this user will be displayed:
You can change the name of the user, select another protection profile for the user, and specify whether the user is allowed to accept other devices by entering a PIN or not. In addition, you can see which devices this user is assigned to as main user, and whether the user is currently active on other devices.
Page 43
17.10.2017
Page 43 of 81
8.2.6 Remove User
You can remove a user with the button "Remove user" in the detailed view of the user (see above). However, the button is disabled when devices are still assigned to the user. First assign a different user to the corresponding devices to activate the button.
8.2.7 Create new profile
Navigate to the “eBlocker Settings > Parental Control” and click on the page “User Profiles”.
The eBlocker provides a default “Standard Profile as well as a few sample profiles with Parental Control restrictions:
The Standared Profile does not contain any restrictions on Internet access. It is automatically assigned to all existing and new devices in the home network.
In addition, the eBlocker provides predefined Protection profiles for different requirements as examples and suggestion.
Click on the button "New Protection Profile" to create a new Protection profile. In order to keep your profiles apart, assign names and a brief description. Save the profile afterwards.
Page 44
17.10.2017
Page 44 of 81
To access the settings of the profile you just created, click on it in the list. You can change the name and description of the profile, modify site and category filters, create time constraints, or delete the profile.
In the profile details, you can also see to which users the profile is currently assigned. Initially, no Parental Control restrictions are activated in a new profile and no users are assigned to it:
You can now adjust the following settings to create a Protection profile according to your needs:
Deny or allow access to certain categories of websites. Allow Internet access only at certain times of the day. Limit the maximum Internet usage time per day.
Details to all settings can be found in the next sections.
Page 45
17.10.2017
Page 45 of 81
8.2.8 Deny access to categories of websites
To deny access to certain categories of sites, activate the site category filter by clicking the slider button.
The following Dialog box opens:
When you move the mouse over the list of categories, you will be informed of the content of the categories by a tooltip. Select the categories that should be banned for the profile and save the settings.
The filters are then generated for this profile. This may take a few seconds because some lists have literally millions of entries. You can adjust the website category filter at any time by clicking on the "Edit" button:
Further details on the category filters and how you can create your own categories of blacklisted or whitelisted websites can be found in sections 8.2.15 and 8.2.17. The eBlocker provided category filters are automatically updated daily. To disable the restrictions of the category filter completely, deactivate the corresponding sliding switch.
Page 46
17.10.2017
Page 46 of 81
8.2.9 Restrict internet access to certain time slots a day
For each day of the week, you can specify one or more time slots that allow access to the Internet through this profile. Activate the sliding switch to restrict the internet access:
If no time periods have yet been defined, the following dialog box opens directly:
After adding the first time slot, the configuration is displayed like this:
To add more time slots, click the "Add" button. To change predefined slots, click the pencil icon next to the slot. To remove slots again, click the minus symbol next to the slot. To completely disable the restriction on time slots, deactivate the corresponding sliding switch.
8.2.10 Limit the maximum Internet usage per day
In addition to the time slots, which define the time of day, when Internet usage is generally allowed, you can set a maximum internet usage time for each day of the week. So it is for example possible to allow Internet usage in the time from 7am to 8pm, but within this time restrict the Internet usage to a maximum of one hour in total. Activate the sliding switch to restrict the maximum daily usage time:
For a newly created Protection profile, the daily usage is set to 1 hour. Click on the "Edit" button to change the daily usage restrictions. The following dialog opens:
Page 47
17.10.2017
Page 47 of 81
Set the maximum usage time for each day of the week and save the settings. Then the configuration is as follows:
Deactivate the corresponding sliding switch to disable these restrictions completely.
Note:
The corresponding online time is available for each user individually. It is not divided among different users of the same profile.
8.2.11 Assign a user to device
To activate Parental Control for a device, a user must be assigned to that device. Navigate to the "eBlocker Settings > Devices" (see section 8.) and click on the device to which you
want to assign a user:
Page 48
17.10.2017
Page 48 of 81
A new device is initially not assigned to a user. Click on the according selection list and select the main owner of that device. The device will immediately be subject to the restrictions as defined by the protection profile of that user.
It is possible to assign multiple devices to the same user. Then the same filter rules apply on all these devices. The Internet usage time per day is summed up for all these devices.
8.2.12 Controlbar for users with protection profiles
If a protection profile is set for a user that contains one or more parental control restrictions, this user is provided with a modified and restricted controlbar. Via the additional menu item "Online-Times" you can see the currently remaining internet usage time as well as the allowed usage times:
Page 49
17.10.2017
Page 49 of 81
8.2.13 What happens if the daily internet usage time is limited?
If the daily Internet usage time is limited, Internet access must be activated explicitly. Otherwise, automatic processes of the operating system or other apps on the devices would unintentionally "consume" the usage time. E.g. because the apps might regularly check for updates. Therefore, the following page is displayed when the user tries to go to any page using an Internet browser:
To activate the Internet use, the sliding switch must be activated. From this moment on, the remaining usage time is correspondingly reduced. The currently remaining time is displayed to allow the user a flexible time management.
Page 50
17.10.2017
Page 50 of 81
The current remaining usage time can always be reviewed via the eBlocker icon and the controlbar. It’s also possible to end internet usage via the controlbar in order to spare the remaining Internet usage time (e.g, see above: “Remaining time: 39 minutes”):
The Internet access is also automatically deactivated after a few minutes, when there are no Internet connections seen by the eBlocker. This also helps to consume the daily Internet usage time in a flexible and meaningful way.
8.2.14 What happens if the internet access is denied?
When Internet access is denied, while using an Internet browser, one of the following messages is displayed depending on the reason for blocking the Internet access. This message is displayed in order to make it clear why the Internet access was denied.
Please note that other applications and apps may not function as expected and may display unspecific error messages, when the Internet connection is blocked. Displaying a corresponding message by the eBlocker is in most cases not possible with such applications.
Restriction through category filter: If access to a site has been disabled due to a site category filter, the user will see the following message from the eBlocker instead of the desired site:
Page 51
17.10.2017
Page 51 of 81
Via the button "Configuration" the Parental Control settings can be accessed directly. Of course the administrator password is required to do so (see section 8.1.3). The active user of the device can be changed via the button "Change user". If the new user is subject to another protection profile, access to the page might or might not be allowed, depending on that other profkle. In any case, the corresponding user PIN must be entered to switch to another user.
Restriction of access outside of allowed time slots:
If access to a website takes place outside an allowed time slot, the user will see the following message from the eBlocker instead of the desired Web site:
The "Configuration" and "Change user" buttons have the same function as described above.
If the maximum usage time per day has been reached: If a maximum usage time per day is set and has already been reached, the following message is displayed:
Page 52
17.10.2017
Page 52 of 81
The "Configuration" and "Change user" buttons have the same function as described above.
8.2.15 Add own lists to the Blacklists
Navigate to the "eBlocker Settings > Parental Control" menu and click on the page “Website Blacklist”:
The eBlocker aready provides a set of predefined blacklist categories:
Page 53
17.10.2017
Page 53 of 81
You can create additional categories with lists of disallowed websites at any time and use them in the protection profile. Click on the button "New category". The following dialog opens:
You can view, add, or remove your own blacklist categories at any time. All your own categories can be selected in the Protection profiles together with the already provided categories (see section
8.2.8.):
Page 54
17.10.2017
Page 54 of 81
8.2.16 Add whitelists to blacklist categories
The provided blacklist categories are very comprehensive and are updated regularly. It is, of course, possible that the lists are too strict in some cases and deny access to websites that your children need and should receive access to. To avoid having to disable the entire protection category just because of a few websites, you can define exceptions from the standard categories by defining categories of explicitly allowed websites – also called “whitelists”
Navigate to the "eBlocker Settings > Parental Control" menu and select the page "Website Whitelists”:
Create a whitelist category with websites for which you want to explicitly allow access. Initially, the list of categories with allowed sites is empty. Click on the button "New Category" to create a new category:
Once you have created one or more categories with explicitely allowed websites, these appear as possible exceptions in the configuration of the protection profiles (see section 8.2.8):
Page 55
17.10.2017
Page 55 of 81
Activate the exception slider switch and select the exception/whitelist categories you want to use in this profile.
8.2.17 Add own whitelist categories
Rather than restrict Internet access through categories of blacklists, you can also work with categories of explicitly allowed sites. Everything that is not expressly allowed is then automatically forbidden.
Navigate to the "eBlocker Settings > Parental Control" menu and click on the page "Websites Whitelists:
Create one or more categories of explicitly allowed sites:
Page 56
17.10.2017
Page 56 of 81
You can use these whitelist categories, when creating a protection profile. In order to work with explicitly allowed websites, you must change the main policy in the access restriction dialog from "Following catagories are restricted, everything else is allowed" to "Following catagories are allowed, everything else is restricted":
Note that Internet access through such profiles can be very limited. So it may not be possible to load operating system updates, and many apps will likely not work as usual.
8.2.18 Change of user through controlbar
If a PIN has been assigned to one or more users (see section 8.2.4), the current user of a device can be changed via the controlbar. Through the change of the user, the respectively active protection profile might also change. Thus changing or even disabling the access restrictions of a device can be very simple.
Suppose Dad, and Mom have a user PIN, but Tim and Lara do not. Then the controlbar on Lara’s device would look like this:
Page 57
17.10.2017
Page 57 of 81
The adults can temporarily take ownership of the device by entering the PIN and thereby temporarily remove the protection restrictions:
After the device switchover the controlbar looks like this:
The controlbar always shows the current user as well as the main user of the device. If the device is currently used ba a different user, then it can be returned to the main user by selecting “Return device”. If the main user himself has set a PIN, the PIN is required for the return. Additional functions are available to users with PIN:
Lock Internet access for the device. Only a user with PIN can remove the lock. Change own PIN.
Page 58
17.10.2017
Page 58 of 81
8.2.19 Migration of Parental Control to eBlockerOS 1.0
If you have already used Parental Control in eBlockerOS 1.0, you will notice that users have been created for each protection profile in use. These users have automatically been assigned to the appropriate devices.
This was necessary because the profiles are no longer directly assigned to the devices.
Nothing should have changed in your home network, due to the upgrade.
In order to make the best of Parental Control, you should rename or replace the automatically created users and add more, if necessary.
8.3 Devices
The „Device“ function shows a list of all network devices that are identified by your eBlocker in your home network.
The devices are initially identified by their IP address and - as far as the eBlocker can determine - by the manufacturer. By clicking on the IP address, you open further details about the device and can adjust the settings.
Your router and eBlocker have their own grey icon. You can assign an optional name to both devices, but you cannot make any other settings.
Devices with an orange icon are online are currently active on your network.
Devices with a grey icon are currently not active in your network.
Page 59
17.10.2017
Page 59 of 81
8.3.1 Devices – General
8.3.2 Devices - General - Name
We recommend assigning a device name to all devices so that you can easily recognize them at any time (e. g."Christian's laptop", "Living room TV" or "Sabine's smartphone").
The IP address, the hardware address (MAC) and, if available, the manufacturer per device are also displayed here.
8.3.3 Devices - General - Activate eBlocker
By default, the eBlocker is automatically activated for most devices. Only some device types (e. g. some IP phones and Hi-Fi components) are deactivated in the default setting. Devices for which the eBlocker is activated are displayed with an orange icon.
You can define at any time whether or not the eBlocker should analyze each device individually. If the eBlocker has been activated for the device, further function are available below.
8.3.4 Devices - General - Enable SSL
If the SSL function on the eBlocker have been activated in general (see section 8.4), you can instruct the eBlocker to monitor encrypted connections (SSL) for each device individually.
8.3.5 Devices - General - Activate eBlocker icon
Finally, you can specify whether the eBlocker icon (see section 7.1) should always, never or only shortly be displayed on the device when you open a new website.
Page 60
17.10.2017
Page 60 of 81
8.3.6 Devices – Anonymization
Here you can set whether all HTTP/HTTPS connections of the device should be routed through the anonymization network Tor, or via a VPN connection (see section 7.5). Activate the IP anonymization and then select either Tor or a VPN connection from the selection.
You can also define the cloaking for a device. Open the selection and select one of the predefined cloaking (user agents) or enter your own user agent (see Section 7.6).
Page 61
17.10.2017
Page 61 of 81
8.3.7 Devices – Messages
Here you can specify for each device whether all system messages shall be displayed by the eBlocker, only the important system messages shall be displayed by the eBlocker, or no system messages shall be displayed by the eBlocker.
All system messages are displayed by default for all.
8.3.8 Devices - Discover new devices or remove devices from the list
The eBlocker usually automatically detects new devices in your local network after a short time and displays them on the devices list. You can manually search for new devices at any time by clicking the "Discover New Devices" button at the top of the page.
However, devices that are no longer found by the eBlocker will not be removed automatically. The eBlocker does not know if the device is switched off for a short time only, is offline, or does no longer
Page 62
17.10.2017
Page 62 of 81
exist. At the bottom of the page you can either remove all devices that have no IP addresses, remove all offline devices or remove all devices. Select one of these options if necessary and click the "Remove Selection" button.
8.4 SSL
SSL stands for Secure Sockets Layer and is a protocol to encrypt the communication “end-to-end” between two communication partners. Sometimes you will also encounter the term TLS (stands for Transport Layer Security). TLS is basically the same as SSL. If the standard web protocol HTTP is encrypted with help of SSL, it is called HTTPS. Many websites, especially banking and online shops are encrypted with SSL nowadays. Thus you can be sure that you are communicating with the providing website and no third parties can change or read your typed in data. However, not only reputable shops or banks use SSL. Tracking and ad providers are collecting your data through HTTPS/SSL increasingly. Your profile data will be send to the tracking server in an encrypted code, but this will not stop the data collector to create a detailed profile of you further on. Each eBlocker generates a device unique root certificate and private key when SSL is enabled. This is used to encrypt the communication to your device when the eBlocker terminates the SSL-connection. We do not have access to the private key nor to the device itself and have taken high security measures to protect the eBlocker from hacking - but of course there is no 100% security. We've made SSL decryption an option. If you feel uncomfortable having eBlocker decrypt the SSL connecting, please do not enable this option.
As soon as SSL is enabled, eBlocker times encrypted connections, so the data stream can be analyzed. Like that, your eBlocker is the end of the “end-to-end-encryption”. Because the browser expects an encrypted connection for HTTPS, eBlocker encrypts the communication to your device.
Therefore it is necessary to adapt the security certificate of your eBlocker in all your browsers and devices for once. Sometimes this certificate is also called certificate for certificate authorities or as root certificate.
For this, click on the eBlocker icon at the top right of your browser and go to „Settings”. Click on the area “SSL”. Activate SSL for your eBlocker by switching the button to the right.
A short note appears that the eBlocker will terminate all encrypted SSL/HTTPS connections and re­encrypt them towards the targeted server, so the eBlocker can monitor all SSL connections.
Page 63
17.10.2017
Page 63 of 81
Click on “Help – how to add the certificate” below „Important notes“ to get detailed information about adding the certificate.
Please note that it is necessary to save the so-called security certificate of your eBlocker in your operating system first and then in the browsers that have their own certificate store as described in section 6.2.
8.4.1 Define exemptions for end-to-end encryption
If your eBlocker should not be active on specific websites that are encrypted, like online banking for example, you can add the specific website to the SSL-exemption list.
Page 64
17.10.2017
Page 64 of 81
If you do not want your eBlocker to monitor the SSL-connection to the website of your online bank, add an exemption to the SSL-exemption list accordingly: Choose a definite domain (e.g.
“Commerzbank”), enter the URL of the banking website and complete the process with clicking on the orange button named “Add domain”.
You can see an exemption list below the input fields, that has been prepared already. If you are not satisfied with one exempted domain, you can easily delete the domain by clicking on the orange trash can icon, to the right side. As soon as the domain has been deleted from the exemption list, your eBlocker will monitor this website again automatically, even if the connections are encrypted with SSL.
8.5 Apps
If individual apps are not compatible with your eBlocker, you can exclude websites that are addressed by these apps (often unnoticed in background), so they won’t be monitored by your eBlocker anymore.
Click on „Apps“ for this procedure first.
You can see a list of predefined exemptions for different apps that you activate or deactivate with one click on the slide switch at the very right side.
Some exemptions for well-known or important apps are already activated in the general setting. Please note, that every activated exemption means you will not be protected by your eBlocker on that
according website. If there is an app missing that you would like to be added to the exemption list, you
can add the desired app by clicking on the field “New app definition” at the top of the site. After
clicking this field, a new window will appear.
Page 65
17.10.2017
Page 65 of 81
Enter the app name and optionally write a little description to it. The app name has to be definite. Enter one or more domains that are used by the app and should not be monitored by your eBlocker. Enter one domain per line. You can end the line by pressing the enter/return key. A superior domain encloses all subdomains automatically. An example: If you add the domain
api.superapp.com to the exemption list, all hits to domains like login.api.superapp.com will be excluded to be monitored by your eBlocker automatically.
In rare cases, it is necessary to include IP addresses to the exemption list. You can enter IP addresses in the last field. Enter one IP address per line. Finish the process by clicking „save“.
8.6 Set up and use the Tor network
As described in section 7.5, you can disguise your actual IP address by using the anonymization network.
The eBlocker always connects to the IP-Anonymization via the Tor network To enable the IP anonymization, open the controlbar. Go to “Anon” and click on “Enable IP
anonymization”.
On the following page, click on "IP Anonymization" on the left side of the eBlocker console and select the "Tor network" menu item in the upper right corner.
Page 66
17.10.2017
Page 66 of 81
You can choose one or many countries, from where an exit server will be chosen randomly. Click on
“Apply” to confirm your choice. Open any website, click on the eBlocker icon and open the eBlocker
controlbar. Click on “Anon” and activate “Tor network” with one click. After activating Tor the anon
icon is filled with a checked pattern to indicate it is active.
From now on you can surf anonymously via the IP address assigned to you by the Tor network. An Internet service provider will think that you are located from one of the random chosen countries. Thus you can avoid any censorship or can have access to content that is only available in certain regions of the world.
Please note that the Tor-network is an association of volunteering Internet activists, that provide service cost-free but with no availability guarantee.
If no country is selected, an exit server of a random country will be used. With a click on "Check connection" you can check if there is a connection to the Tor Network after
activating the Tor Network. We have selected three well-known websites for you.
Page 67
17.10.2017
Page 67 of 81
By clicking on "Tor: Get new identity" you can switch from the controlbar to another Tor exit server of the country.
To disconnect the Tor connection click on the anon icon first and afterwards on the Tor icon. The checked pattern on the anon icon will then be removed again.
8.7 Set up alternative VPN network
Instead of the standard Tor network provided by the eBlocker, you can use a VPN connection from any other VPN provider. VPN networks can be set up under "eBlocker Settings > IP Anonymization" and "VPN Networks". There, you can also find a link to the list of VPN providers we tested. This list is updated regularly. You can also use other VPN providers as long as they support the OpenVPN protocol.
Note: Other VPN provider may charge additional costs. Connection speed may vary depending on the VPN provider.
Your VPN provider usually provides you with a username, password and a configuration file, it’s name
ending on the suffix ".ovpn". This configuration file is needed to set up the connection to the VPN network.
Page 68
17.10.2017
Page 68 of 81
To create a new VPN connection, click “New VPN Provider”. Now follow the wizard's instructions and
upload the configuration file provided by your VPN provider.
After uploading the configuration file you have the option to upload other files, if needed. After uploading the files you will be shown details regarding ignored or unsupported options from the eBlocker. This is generally harmless and the ignored or unsupported options will not lead to any kind of malfunction. The eBlocker can still be used optimally. Click on "Next".
Enter the username and password you have received from your VPN provider into the respective access data fields and click on "Next".
Page 69
17.10.2017
Page 69 of 81
Enter a name and description for this VPN network. Finally, decide if you wish the VPN network to be available in the eBlocker controlbar by clicking on the switch slide. If you do not want the connection to be shown in the controlbar, it will only be visible in your settings and displayed as inactive.
You have successfully created a new VPN network and can edit, remove, or run a connection test with a click on the name.
In the eBlocker Controlbar, you will see the VPN network you have just created under the "Anon" menu item. The connection is verified by clicking on the VPN network, and a check mark is displayed to indicate successful connection to the VPN network. If the connection was not successful, no check mark would be displayed. In this case, go back to settings and verify your username and password.
After activating the VPN network, the Anon icon in the control bar is filled with a checked pattern to indicate it is active.
To disconnect the VPN connection click on the anon icon first and afterwards on the VPN icon. The checked pattern on the anon icon will then be removed again.
Page 70
17.10.2017
Page 70 of 81
To disconnect, first click the Anon icon and then the VPN network. The Anon icon in the control bar will be empty and the eBlocker will automatically be connected to Tor.
Note:
A Tor connection cannot be used simultaneously with an existing VPN or another existing Tor connection.
8.8 System
By clicking on „System“ you can apply following settings:
8.8.1 Reboot and Shutdown
Through this page you can reboot and shutdown your eBlocker. To reboot your eBlocker after shutting down, unplug the power supply from your device, wait for 30
seconds and reconnect your device to the power supply afterwards.
Page 71
17.10.2017
Page 71 of 81
8.8.2 Time zone and language
Through this page you can set the time zone and language of the eBlocker controlbar and of the eBlocker console.
For setting the time zone, select the region and the main city of your country first. Click on the button “Set time zone” to save your selection.
For setting the language, select the language first and click on the button „Set language“ to save your selection.
8.8.3 Events
The eBlocker detects events like the network connection has been disconnected, or power supply has been disconnected without the eBlocker shutdown. Such events are recorded here for you as information. You will see a notification in the controlbar when a new entry is listed the event list.
8.8.4 Diagnostics report
If an error occurs, you can generate an automatic diagnostic report that you can send to us to
support@eblocker.com. This allows us to find a solution quickly. Generate the diagnostic report very
easily with a click on the orange button „Generate report“ and wait for a few seconds. Afterwards you
Page 72
17.10.2017
Page 72 of 81
have the possibility to download the file and to send it to our support. We will come back to you as soon as possible.
8.8.5 Reset registration
To reset the activation and license obligation of the device, click on „Reset activation“. A new window will appear asking you, if you really want to delete the update license from your device. If you want to delete the license, please enter the email address that you used for activating your eBlocker. Please note that this process is irreversible.
8.9 Network
In most of all cases your eBlocker can be configured in the automatic configuration mode. In some cases, for example if you have a special networking infrastructure, you might have to setup
your eBlocker individually so you can use your device optimally.
Page 73
17.10.2017
Page 73 of 81
The aim of the individual setup is to set your eBlocker as DHCP server and gateway in your local net. For that click on the area „Manual setup wizard“. The setup wizard will help you through the process
of the individual setup.
The implementation of the individual setup leads through the following stages:
1. Setting of eBlocker as DHCP server and reboot.
2. Deactivation of DHCP services in your router/Wi-Fi access point.
3. Reboot of other network devices.
Get to know how to deactivate the DHCP service in your Internet or Wi-Fi router for step 2. Do not follow this step if your eBlocker has not been set as DHCP server first. Attention: Only use the individual setup mode if you have issues with the functionalities of your
eBlocker or other network devices in the automatic mode.
Page 74
17.10.2017
Page 74 of 81
8.10 Advanced
8.10.1 DNS (beta)
If you enable this feature, you can distribute the DNS queries through your eBlocker to a list of different DNS servers, or resolve them over the Tor network. Three different options are available for this.
Use the default settings for the local network Use a predefined list of DNS servers for availability, in sequence, or in random order Use the Tor network, even if the traffic is not routed through Tor
Use the default settings for the local network
The setting of your local network is used here. This means that the DNS server is used that you have added in your router configuration.
Use a predefined list of DNS servers for availability, in sequence, or in random order
Use this option to add a list of DNS servers. This list can then be processed according to availability, in sequence, or in random order from the eBlocker.
Use the Tor network, even if the traffic is not routed through Tor
Here, the DNS requests are routed through the Tor network and are passed on to a DNS server at the starting point of the Tor network. Make sure that Tor is available. You can check this in the menu IP Anonymization > Tor Network.
8.10.2 WebRTC
WebRTC is a browser technology that enables real time communication by establishing peer to peer connections. This is useful for applications like VolP/Internet calls and chats. Unfortunately WebRTC reveals your real IP address (and even your local LAN IP) to establish the connections. Even when using Tor (IP anonymization) your real IP address is visible when using WebRTC and it can be used to identify you. Decide with one click if you want to enable WebRTC connections.
8.10.3 HTTP Referrer Header
HTTP Referrer Header is regularly set when browsing the web. The referrer reveals the website you have been visiting before reaching the current website. By using the referrer header websites can partly track your surfing habits. Some websites use the referrer header also for internal purposes and blocking the referrer header can result in some sites not working properly. Decide with one click if you want to enable referrer header.
8.10.4 Google Captive Portal Check
Google Captive Portal Check is used by Google products like Android, Chrome, Chromebooks and Chromium to determine if you are connected to the Internet by sending a request to Google. eBlocker
Page 75
17.10.2017
Page 75 of 81
blocks these requests in order to hide your IP address from Google. Enable this option if your Android device drops the Wi-Fi connection frequently.
8.11 Expert Tools (beta)
"Expert Tools" is for tech savvy users only. It is used for defining domain exceptions where eBlocker should be deactivated. If an app is not compatible with eBlocker-SSL (see also section 5.6), the SSL connection requests from a device can be recorded. Afterwards eBlockers behavior for this connection type can be defined, tested and saved as an app definition. Proceed as follows:
First analyze the HTTPS/SSL-connections that runs directly from the app. Then you can set rules how your eBlocker should deal with these connections (activate eBlocker for connections or deactivate your eBlocker for connections). Choose the device on which you are using the app, as well as the duration of the recording, the maximum size of the recording file and start recording afterwards.
Use the app as usual. Especially test the functions that seem to not be compatible with your eBlocker. Update the list with the recorded connections afterwards.
To find the domains and IP addresses your eBlocker should not be active on, it is necessary to try out different settings. Use the switch slide ("Test temporary rule set“), so the selected rules can be effective temporarily and test the functionalities again.
Page 76
17.10.2017
Page 76 of 81
Please note that the proposed rules may not always be correct, because of some connections that are recorded that do not source from the tested app.
As soon as the app runs smoothly with temporary rules, you can save these rules as a new app definition for good.
Page 77
17.10.2017
Page 77 of 81
9 Quick guides
9.1 Delete cookies, cache and browsing history in browser
Depending on the browser you are using, you can delete cookies in many different ways. The deleting process for the most important browsers are explained in the following section. If your browser is not listed here, please follow your browser instruction how to delete cookies, cache and browsing history.
9.1.1 Firefox
Open your browser and click on the menu symbol at the right top of your browser. A new browser window with different options will appear.
Click on settings and go to “data protection”. Click on „recent set chronicle“. A new window will open in which you can add relevant subjects t hat
you want to have deleted afterwards. We recommend to add following subjects in order to erase your trace completely.
Visited websites & download chronicles Cookies Submitted search terms & form data Offline website files
Through the link „Today’s chronicle“ you have the option to set a period of time. We recommend to choose every subject in order to be fully protected against trackers. Finish deleting your browsing history by clicking “delete now”.
9.1.2 Chrome
Open your browser and click on the menu icon at the right top of your browser window. Go to settings
and click on “history”. Finish deleting your browsing history by clicking “delete browsing data”. Please
note to state the whole period of time.
9.1.3 Internet Explorer
Click on the setting icon at the right top of your browser window. Go to „Internet Options“ and to „General“ afterwards. Finish deleting your trace by clicking „delete browsing history“.
Page 78
17.10.2017
Page 78 of 81
10 Glossary
Content lock
Providers of (e.g.) journalistic content have a legitimate right – and of course the necessity – to make money with their offers. Many providers offer users to pay for the content directly, individually or per subscription – or just to accept that the called up site contains advertisement.
Some providers reserve the right to lock the cost-free service if the user uses an ad-blocker. This lock
is also called “content lock”.
eBlocker’s aim is not to destroy the business plan of Internet providers. However, we do block ads
from advertising networks for these kind of sites, because nowadays the ad banners are used for profiling. We do not help to avoid the named content lock. Instead we recommend to honor high­quality content on a fair basis, so independent quality journalism is permanently preserved for all of us.
Cookies
Cookies typically contain data about visited websites, that the web browser of this websites saves on your computer and uses the next time you visit the same website again. Cookies however are not fundamentally bad. They can increase the user comfort e.g. if you do not have to sign up again after already having visited the website. Cookies can also be used to recognize the same individual on different websites, so personality profiles can be generated comprehensively.
These tracking cookies are blocked from your eBlocker, so that they cannot even get into your computer.
DHCP server and DHCP lease
The Dynamic Host Configuration Protocol (DHCP) enables the automatic integration of network devices into all networks. A central server – in such case the router - assigns the network configuration to all devices. The lifetime of this assignment is called lease time. The administrator can choose the existence of the lifetime at the router settings. The lease time can be indicated in seconds, days or even weeks. If the DHCP server is changed during operation, all computers/devices must be disconnected from the network once, so every device can be notified by the new DHCP server and thus receives a DHCP lease.
Digital certificate
A digital certificate uses cryptographic methods, to verify the details to a communication partner obligatory. For example, if a certain website is actually run by the named company. Digital certificates are usually issued by trustworthy certification authorities that verified the details and take responsibility for the correctness.
DNS Server
The DNS server (Domain Name System) is some sort of telephone book for the Internet. It translates the server names from URLs and from email addresses to numerically IP addresses. The webserver is identified and spoken to through the IP address.
LAN cable
The LAN cable (Local Area Network) or also called Ethernet cable, is a network cable that is required for connecting the computer and other devices to your local net. Ethernet cables are often yellow colored. The supplied Ethernet cable of eBlocker is obviously orange colored!
Malicious software
Malicious software is the generic term for dangerous computer programs like viruses, worms or Trojans. Malicious software can get into your computer by visiting infected websites or by opening infected emails. Even banner ads that appear on websites which appear as trustworthy may contain
Page 79
17.10.2017
Page 79 of 81
the so called “malware” in short. Not every malware is immediately noticed (or at all). The best way to
protect yourself from malware is to keep your system as up to date as possible; no opening of suspicious emails that are send from dubious sources; using the latest antivirus program and of course, using your eBlocker.
Network mask
With help of the IP address the network mask defines which other IP addresses belong to the local net. That means which addresses can be reached directly. All other IP addresses that do not belong to one network mask, do not belong to the local network and can only be reached through the router.
Price discrimination
Price discrimination describes a price policy on the Internet, where you get different prices for the same product depending on from which device you want to buy the product. The price is set dynamically according to the known data of the user with the aim to maximize their revenue.
Referrer
If you open a website, your browser sends you an according request for the website you want to visit. This request not only contains the URL, but also many other meta-files for requests. Amongst other things the browser transmits from which website the new request was send from. This indication is called „HTTP-referrer“ or in short „referrer“.
It has the legitimate right, to see insights which sites have been visited by the user and thus can optimize their offers accordingly. The referrer can also be used in a comprehensive way, so personality profiles can be created and connected.
Tor Network
The Tor network is used to disguise your original IP address and to provide anonymous Internet surfing. Suppose you have a certain page you want to visit and therefore you enter the URL into the web browser. Your IP address is sent directly to the page you want to visit. However, if you use Tor, you will be directed into the Tor network, which is made out of many other IP addresses from different computers. The Tor network will send an IP address to the page that it chooses randomly out of all the other IP addresses floating around the Tor network. This is how your real IP address is disguised.
Tracker – Data collector
Most of the time trackers are service providers for advertising industries. Every time a user opens a site that is being tracked, the tracker gets a notification that a user has been tracked successfully.
Through according cookies or other techniques, the tracker can recognize the user even through many different websites again and again and thus generate a detailed protocol of the Internet behavior. All trackers make their money by providing these personality profiles to advertising industries. The advertising industries can now generate target oriented advertisement and place them on sites that are visited frequently by the user.
openPVN
OpenVPN is an open-source software application that implements virtual private network (VPN) techniques for creating secure connection.
VPN
A virtual private network (VPN) extends a private network across a public network, and enables users to send and receive data across the public network as if their computing devices were directly connected to the private network.
Page 80
17.10.2017
Page 80 of 81
Appendix A Technical specifications
(not valid for software licenses)
1 x 10/100/1000 LAN RJ45 1 x Power supply 5V (≥ 2A) 1 x Wi-Fi 802.11 b/g/n 2 x USB 2.0 (for extensions) 1 x HDMI (not in use) Power consumption: <10W Dimensions: 9x9x9cm Weight: ca. 153g
Appendix B Safety notes
Please mind the following safety notes before using your eBlocker.
Your eBlocker does not have a power switch. A disconnection from the power supply
should be possible at any time.
In case of wall mounting your eBlocker, please ensure that no wires or piping can be
damaged behind the mounting surface.
Please protect your eBlocker from moisture, dust, liquids and vapors. Please do not block the air vents of your eBlocker. Never disconnect the power supply or network connection during an update. This can
damage the eBlocker irreparably.
Appendix C Manufacturer & copyright
eBlocker GmbH Kaiser-Wilhelm-Str. 47 20355 Hamburg Germany www.eBlocker.com
Appendix D Technical support
Web: http://forum.eBlocker.com Email: support@eBlocker.com
Unfortunately we do not offer any telephone support at the moment.
Page 81
17.10.2017
Page 81 of 81
Firmware-Version
eBlocker Pro/Family 1.9_20171019-v29
eBlocker GmbH
All rights reserved. Errors and omissions reserved
eBlocker GmbH | Kaiser-Wilhelm-Str. 47 | 20355 Hamburg | Germany
Loading...