Skip to content
LogoTechnipages
LogoTechnipages
  • Topics
        • Android
        • Browsers
        • Gaming
        • Hardware
        • Internet
        • iPhone
        • Linux
        • macOS
        • Office
        • Reviews
        • Software
        • Windows
        • Definitions
        • All Recent Posts
  • Product Reviews
  • About

What is a Blacklist?

Mel HawthorneJanuary 3, 2023 Comments (0)
Internet Security

A blacklist is a list of one form of entity or another that the list’s curator has determined to be unwanted. The list is then used to actively restrict the listed entities in one form or another depending on the specific use case. Blacklists may be extremely specific against particular individuals, or software programs for example. Alternatively, they can also be quite general such as with a location-based blacklist. Lists can end up affecting innocent parties but there may or may not be an appeals process depending on the list and its curators.

Contents

  • 1 Examples of general use
  • 2 Methods of bypassing blacklists
  • 3 Controversies
  • 4 Conclusion

Examples of general use

A classic class of a blacklist is a list of blocked URLs. There are plenty of potential reasons to block websites. Common classes of sites that get blocked include sites that serve malware. Phishing sites, gambling sites, adult content, and social media are all common targets of blacklists. These blacklists may be enabled by installing some management software, through settings on routers, via ISP settings, and may even be government-mandated.

Very closely related to URL blacklists are IP blacklists. These are more typically implemented on servers against malicious users. For example, a user running an online password brute force attack may generate enough failed login attempts that an automated system adds the attacker’s IP address to a blacklist. Depending on the implementation, this sort of blacklist may be temporary, expiring a set amount of time after the attack stops. It may, however, be a permanent block.

To prevent users from selecting known weak passwords, some organisations and sites implement a password blacklist. Technically, password complexity rules don’t qualify as a blacklist as they are more of a validation rule. Nevertheless, some sites check new passwords against lists of passwords that have previously been involved in data breaches. These passwords are significantly more likely to be attempted by a hacker in the future and so are considered extremely weak.

Some governments or organisations may implement regional blacklists. For example, blocking access to their services to users in an authoritarian country with a repressive regime. Conversely, authoritarian countries with repressive regimes may blacklist access to external content. This often targets external news sources, social media platforms, or the wider Internet in general.

Methods of bypassing blacklists

It may not be possible to bypass all blacklists. This is especially the case when dealing with systems primarily controlled by a third party. Additionally, bypassing, or even attempting to bypass a blacklist may be considered a criminal act, a fireable offence, or viewed negatively in some other way depending on the blacklist and who implemented it.

VPNs are a classic way of bypassing blacklists. They involve setting up an encrypted connection to a third party and then routing all traffic through there. From the perspective of a network monitor, all they see is encrypted traffic to the third party, not where that traffic goes after that. Some blacklists are implemented by using a custom DNS server. These are typically ineffective as they can be bypassed by manually switching DNS server to a public unfiltered one such as 8.8.8.8 run by Google or 1.1.1.1 run by Cloudflare.

IP blacklists can often be dodged by power cycling your router. This typically results in your ISP providing you with a new public IP address to use that is unblocked. This can negatively affect other innocent users if they later get assigned the blacklisted IP. This is why IP-based blacklisting is typically temporary.

Controversies

There is little difference between mandatory blacklist implementation and censorship, especially when enforced by a government. In some cases, affected parties may not generally object to the application, in other cases the filters may be regarded as oppressive. Attitudes on the subject tend to vary by culture and by the type of content blocked.

There is social tension over the use of the word “Blacklist”; specifically, the use of the word black. Parallels are drawn between racism and the fact that the polar opposite of a blacklist is referred to as a whitelist. Arguments typically state that the word black and its actively negative connotations contributes to or is at least an example of the use of racist language. There is considerable and often quite emotive discussion on the subject and even the validity of some of the arguments. A similar argument, however, is brought up regarding the use of the terms “master” and “slave” in computing. On that subject, there are still some willing to debate but it is generally much more of a clear-cut issue.

Suggested alternatives to the term blacklist include “deny-list” and “block-list”. Whitelist primarily sees the alternative term “allow-list”. Master and slave terminology is typically replaced with the terms “primary” and “secondary” respectively, though some other terms have been suggested or adopted. While some may not agree with the suggested reasoning for the change in terminology, there are benefits. Firstly, it does address any potential racial issues, increasing inclusivity. Additionally, it also makes the language clearer to understand. Most of the suggested alternative terms are instantly understandable to people for whom English is not their first language. Some of the older terms can require a deeper cultural understanding and context rather than simply knowing the language.

Conclusion

A blacklist is a list of some form of entities that is used to prevent access to, or potentially from, the listed entities. The curator of the list may or may not have some sort of appeals process. Blacklists are often used to deny access to content deemed objectionable. They may also be used to prevent access from senders deemed objectionable. Blacklists can be implemented at many levels, by many different curators, and are complementary. By design an entity on the blacklist is blocked, implying all other unspecified entities are allowed. The opposite is a whitelist. A whitelist is typically a list of exclusively allowed entities, but may not necessarily be exclusive, instead being a way to prevent an entity from being blacklisted. The term blacklist is challenged for its potentially racially insensitive connotations. The alternative terms “block-list” and “deny-list” are intended as objectionable drop-in replacement terms.

Categories: Hardware

Author Mel Hawthorne

You Might Also Like

  • What is Pi-hole?

    Mel HawthorneHardware
  • airpods not working with zoom mac

    Fix AirPods Not Working with Zoom on Mac

    Madalina DinitaHardware
  • Oculus

    VR Oculus Quest 2: How to Troubleshoot Hand-Tracking Issues

    Mel HawthorneGaming
  • Oculus

    VR Oculus Quest 2: How to Change the Color of Your Guardian Boundary

    Mel HawthorneGaming

Leave a Reply

Your email address will not be published. Required fields are marked *

average laptop lifespan

What Is an Average Laptop Lifespan?

fix 0x80070302 windows update error

How to Fix the 0x80070302 Windows Update Error

how to allocate more memory to a program

How to Allocate More Memory to a Program in Windows

marvel rivals memory leak fix

Marvel Rivals Using Too Much Memory – How to Fix

how to create a macro in word

How to Create a Macro in Word

profile pic

The Experts Behind Technipages

My name is Mitch Bartlett. I've been working in technology for over 20 years in a wide range of tech jobs from Tech Support to Software Testing. I started this site as a technical guide for myself and it has grown into what I hope is a useful reference for all.

Learn More

technipages logo white
linkedin icon

Technipages is part of Guiding Tech Media, a leading digital media publisher focused on helping people figure out technology. Learn more about our mission and team here.

© 2025 Guiding Tech Media All Rights Reserved

  • About Us
  • Contact
  • Legal & Privacy

© 2025 Guiding Tech Media All Rights Reserved

Information from your device can be used to personalize your ad experience.
Do not sell my personal information.