Most of the modern web rides on HTTPS, including the ad networks, trackers, and fingerprinting scripts that we exist to block. This page explains, in plain language, why Adblock needs to look inside HTTPS traffic to do its job, how that works under the hood, and what we do to keep your connection safe while it happens.
HTTP is the protocol your browser uses to talk to web servers. On its own, it is unencrypted — anyone sitting between you and the server (your ISP, the coffee‑shop Wi‑Fi, a curious roommate on the same network) can read or modify what is being sent.
HTTPS is the same protocol with a TLS layer wrapped around it. TLS does two things at once:
bank.example.com and not an impostor.Today HTTPS is the default. Browsers warn loudly on plain HTTP, search engines deprioritize it, and free certificate authorities like Let's Encrypt have made it practically the table‑stakes setup for any site.
A TLS certificate is a small signed document that says: "the public key inside this certificate belongs to this domain". It is signed by a Certificate Authority (CA) that your operating system or browser already trusts.
When your browser opens an HTTPS connection it:
If any of those steps fail, the browser refuses to load the page. That is the mechanism that keeps HTTPS trustworthy.
If we could only see plain HTTP, we would be useless on the modern web. The sites where ad blocking matters most — large video platforms, social networks, news outlets, search engines — all serve their pages, their ads, and their trackers exclusively over HTTPS. To remove an ad request, we have to be able to see that the request is being made.
Concretely, HTTPS filtering is what lets Adblock:
HTTPS is designed to make it hard for anyone to insert themselves between you and a server. To filter it, Adblock has to act as a consensual middle layer that you have explicitly trusted on this device.
When a connection is filtered, Adblock builds two TLS sessions back‑to‑back:
Because your apps trust that local root, they accept Adblock's certificate the same way they accept any other. Adblock can now see the request, run it through the filter rules, and forward it to the server (or drop it). The response gets the same treatment on the way back.
The net effect: your app talks to Adblock over TLS, Adblock talks to the server over TLS, and ad/tracker traffic gets blocked in between. Plain unencrypted data is never exposed to the network.
Yes — with two important nuances that we want to be upfront about.
The connection to the server stays encrypted. Adblock validates the real server certificate (expiration, hostname, signing chain, revocation hints) just as a browser would, and aborts on anything suspicious. Your traffic never touches our servers; everything happens locally on your PC.
The certificate your browser sees is the local Adblock one, not the site's original certificate. That is unavoidable for any product that filters TLS, and it is the main trade‑off of HTTPS filtering. Two consequences worth knowing:
Some traffic should not be touched no matter how well‑behaved the filter is: banking, payments, health portals, government services, and similarly sensitive sites. Adblock ships with a maintained allowlist of these domains and skips HTTPS filtering on them entirely. They simply tunnel through unmodified, with the original certificate going straight to your browser.
If you spot a site you believe should be on that list, let us know and we will review it.
EV certificates require extra paperwork and identity verification before a CA will issue them. They are most often used by banks and large e‑commerce sites. Adblock can be configured to skip filtering for any site that presents an EV certificate, in which case the original chain is preserved end‑to‑end and your browser shows the EV indicator as usual.
Filtering TLS is a powerful tool, and we treat it as such. A few honest limitations:
We continue to invest in the certificate validation library that backs all of this, and we publish details of any meaningful changes to the way HTTPS filtering works.
If you want to confirm that filtering is not weakening your TLS, the same public test sites used for browsers will work for Adblock too:
Run them with filtering on and off and compare. Modern cipher suites, certificate validation on broken test endpoints, and protocol downgrade resistance should all behave the same way they do without Adblock in the loop.