- cross-posted to:
- technology@beehaw.org
- cross-posted to:
- technology@beehaw.org
TL;DR use FF
(and other browsers)
… that aren’t Firefox.
The article talks about Firefox too.
Since January 2018, 42% of malicious extensions use the Web Request API.
That’s like making knifes illegal in general because they have been used in a certain amount of murder cases.
And now, a new golden age of malvertisement will emerge…
Indeed. What a f-ing stupid argument: “We cannot trust the extensions that the user installed, therefor we give malware from advertisers free roam!”
If 42% of crimes used a handgun, we should ban those too.
You just made the argument for gun rights.
Thank you and I love you. <3
You just made the argument for gun rights.
Definitely not. Gun ownership should be abolished like slavery was. A knife has good use for cutting and cooking, but a gun, especially in private hands, has absolutely no reason to exist.
Gun ownership should be abolished like slavery was.
I’ve got some awful news for you about slavery
a gun, especially in private hands, has absolutely no reason to exist
Americans phrase it a bit different:
‘Fuckin guns fuck yea!’Yep. One of the many intellectual challenges that the US is facing…
This finally made all my Chrome friends switch to the fox. about time
I mean it’s just a browser. Bit of fiddling with the saved password and your go to go again to never look back. If they value their users they will improve again like Firefox did in the background over years.
I only hope a good search engine will appear again. I don’t like the alternatives.
I have been using swisscows for about a month. It’s no Google… But it seems to be better than what Google is now…
If you are smart, you have a password manager that you login once then everything is there and ready to login to every single account instantly.
Run a pihole or similar
Your web browser is just one piece of software on your network capable of displaying ads and collecting data
Network-level adblock cannot replace browser-level adblock and vice versa
Both… both is good
That’s reminds me, I should go update mine.
I’m only familiar with pi holes on a cursory level, but you have to update them manually? This is a bit of a turn off.
You could schedule it with cron. You usually don’t need to update the lists very often though, and you don’t want to either as you’re just wasting the bandwidth of the hosts of the lists, who aren’t making any money off hosting them.
I thought this requires permission to a router. Can you do this say at a dorm or an apartment where internet is provided for you through a portal
You can always configure the DNS manually on a device you own to ignore the DHCP settings sent from the router and just go directly to the pihole, obviously not as good as it happening automatically, but a good workaround if that’s not possible
Another user commented that you can run Unbound (the technology used by pihole) on your machine.
Even easier, configure your device to use an ad block DNS resolver. Control D has free ones: https://controld.com/free-dns
I’m a bit clueless when it comes to that but certainly interested. Could you maybe go into more detail as to which hardware and software is needed to set that up?
Thanks much in advance!
So the main software is here https://pi-hole.net/ (and they have good documentation, so I’m not going to repeat the nitty-gritty here)
You obviously need something to run it on, which could be some existing computer that’s always on, but (as the name might suggest) a lot of people use some form of Raspberry Pi (or similar) single-board computer.
Pihole will run on basically anything, so you can get an ancient pi and it will still run fine
If you like this article, please consider following the site on Mastodon/Fedi, email, or RSS. It helps me get information like this out to a wider audience :)
I didn’t even click the article. Here’s Why -
They only have 40 posts so I gave them a follow. It’s when accounts have like 10k posts and an account is less than a year old that I won’t follow them, I don’t need that noise.
I think I’ve made this comment before, but I really wish people would learn more about technologies like pihole. Get the ad once, get the hyperlink, add it to blacklist.
I run a pihole as well, but it is a very rudimentary tool compared to browser based adblockers like uBlock origin. It can only block DNS queries, and can’t for example block ads if they are served from the same domain as the main site (i.e. youtube) or block specific elements on a page or block a specific script from running.
can’t for example block ads if they are served from the same domain as the main site (i.e. youtube) or block specific elements on a page or block a specific script from running.
Yeah that’s true.
Until that ad also happens to be for a legitimate website you want to visit. I’d rather have a adblocker I can change right there in the website
That’s a very rare case, and you can whitelist a domain using the pihole’s web interface. It may require extra two clicks, but I had to do that maybe twice in the last year.
Too much effort for pretty much everything that normal AdBlock already did
But it’s worth it… pretty much can block anything and everything across the entire network - on all endpoints.
Ironically, I wish people including yourself knew more about shit like how PiHole/RaspPi simply leverage Unbound, which is not unique to only Pi software or Pi devices. You can do this same thing on any OS that has it installed.
Adblock is more than just a DNS sink. I have both of those, but still use ublock origin.
Yep, same
Does it have a GUI or is it CLI only?
GUI and cli, however, has no where near the options pihole or adguardhome have; my limited experience is with it in opnsense, so by far isn’t complete but I disable it and forward everything to adguardhome.
What it can do in opnsense (for an example of what can be done with it, blocklist near bottom): https://docs.opnsense.org/manual/unbound.html