Investigator Use
Blokada is an open-source DNS-based ad and tracker blocking application for mobile devices that filters network traffic at the DNS level to block advertising domains, tracking scripts, and malicious domains before they can reach the device. It is available for Android and iOS.
For OSINT investigators, Blokada's relevance is primarily operational security and research environment hygiene rather than direct investigation capability. When conducting mobile-based OSINT research or operating investigation workflows from a mobile device, Blokada reduces the tracking footprint generated by background app activity and embedded tracking pixels in web content.
DNS-based blocking prevents requests to known advertising and tracking domains from ever leaving the device — reducing the intelligence available to ad networks and trackers about what sites an investigator is visiting during research. This is relevant when conducting investigation from a mobile device where ad network data could theoretically be associated with investigation activity.
For investigations involving mobile device security assessments, understanding Blokada's blocking capabilities informs analysis of what data is generated by mobile applications when ad/tracker blocking is and is not active.
The application also provides security by blocking connections to known malicious domains at the DNS level — reducing risk when clicking unfamiliar links during investigation, as malicious domains will be blocked before the browser can connect.
For investigators configuring secure mobile research environments, Blokada is a component of mobile operational security alongside a VPN, privacy-respecting browser, and appropriate app permissions management.
Limitations: DNS-based blocking has limitations — sophisticated tracking methods that don't rely on separately hosted tracking domains may not be blocked. Blokada addresses common commercial tracking but is not a complete privacy solution.
Note the version of Blokada used, filter lists enabled, and any custom blocking rules configured when documenting investigation environment setup.
Before You Pivot
Record Context
Capture the target, search terms, and why this source is relevant before you leave the page.
Preserve Evidence
Archive volatile pages, save screenshots, and keep timestamps for anything that may change.
Corroborate
Treat one tool as a lead source. Confirm important findings with independent sources.
Related Tools
Account Killer
Privacy & Security OSINT
AccountKiller provides direct deletion links and step-by-step instructions for removing accounts on hundreds of websites and social platforms.
AlgoVPN
Privacy & Security OSINT
Algo VPN automates deployment of a personal WireGuard or IKEv2 VPN server in the cloud for private, secure OPSEC browsing.
Canarytokens
Privacy & Security OSINT
Canarytokens creates tracking traps that alert investigators when accessed, revealing attacker IP, time, and origin when planted.
Certificate Search
Privacy & Security OSINT
crt.sh searches certificate transparency logs to uncover domains, subdomains, and infrastructure from TLS certificate data.
Cover Your Tracks
Privacy & Security OSINT
EFF Cover Your Tracks reveals how ad trackers and fingerprinters see your browser to help investigators strengthen OPSEC and anonymity.
DNS Leak
Privacy & Security OSINT
DNS Leak Test checks whether your VPN or proxy is leaking DNS requests, exposing your real IP address during anonymous browsing.