Doesn’t mean that an extension can’t have vulnerabilities.
more extensions = more attack surface
Doesn’t mean that an extension can’t have vulnerabilities.
more extensions = more attack surface
I mean.. any piece of software can have a security vulnerability. By following the logic you can extrapolate that to discount even using any software at all.
But I take your point.
This is completely pointless if you also use adblocking on network level which is what you should be doing anyways.
Ublock is great for content blocking so the web pages don’t look messed up but you also want to block native trackers from the operating systems and apps you use on DNS level.
If you block trackers on DNS level too this addon won’t work either.
Besides all of this regardless of you clicking or not it could still tie you to a certain pattern. It might still build a profile based on your interest because the trackers will load and information you click on now automatically will actually share aggregated data with more parties. Also be aware that information on you does not only come from clicked ads but also just tracking on the content you consume which already drags you into some ad profile.
All in all, no this is far from being a good idea.
Not everyone has the know how to set up Pi-Hole at home. Also, wouldn’t it not work on VPNs if your devices are always connected to it?
Perhaps Privacy Guides can make a how to Pi Hole your network video or a written manual? @jordan @em - can you add this to your lists please?
There is no need. You can just use NextDNS for example or adblock.dns.mullvad.net. Simple as that.
Right. Again, wouldn’t this affect folks who are always on VPNs? Not really ideal nor recommended as I recall. Also, DNS level is less flexible because you can’t control your filter lists as much as with pi hole.
But you said network level and my mind went to network level for your home internet at large, not just network level per device - hence my Pi Hole suggestion.
Why would it not?
![]()
So it would affect folks on VPNs. So it’s DNS level blocking is not really ideal for those on VPNs then.
Are we agreeing?
Forgot to also add the argument that like 99% of malware arrives via advertising. So if your browser automatically opens all kinds of ads this could also be a really good way to get bad luck.
AH!
I see.
You’re still talking with respect to the OP info and this extension. I thought you’re talking more in general about it. Sorry, I didn’t think on the same lines.
Most VPNs have dns adblocking as part of their service? I don’t understand your point.
Yes. But you don’t have much flexibility and its highly limiting if you want to add or customize the filter lists being used by the VPNs themselves.
Well sure. But most people will not tweak uBlock Origin either.
Okay point.
But people who are going to mess with such settings would indeed know what they want and why so it’s still limiting for the tech savvy folks.
I wish pi hole worked with VPNs. Wouldn’t that be a game changer if VPNs can make that happen as a part of their feature set. It’s way beyond what they are meant to be but wow would it cool if it were as simple as tweaking it in the GUI itself.
Well yeah DNS customization would indeed be a cool feature. Proton does have this somewhat but only in their business plans. On the other hand with normal subscription you can also set a different DNS provider.
Proton did release their roadmap for new VPN stuff coming. I am hoping new tech and feature sets are part of this. The flexibility would be amazing and unique to Proton besides all that they offer anyway. And not just DNS customization, filter lists within/for the DNS too. That said, I am also hoping for more obfuscation tech from Proton because only Mullvad is leading the pack right now with 3 proper options.
Isn’t this not recommended though?
It is only not recommended because people still think that a VPN provides anonymity and that surely will be harmed by that. If you don’t use a VPN for anonymity like myself it doesn’t really matter.
Basically, if you know what you’re doing, then its fine. I see how you mean. Got it.
Well I think it’s a choice of balancing. I split tunnel so that I can run certain apps of real IP for speed and local connectivity. Besides I use my own DNS server because I am maintaining a blocklist and I want to use that to maximize blocked trackers and test my listings.
I don’t believe a VPN makes you anonymous. It can help sometimes but I prefer to block more trackers and find them (so I can block them later) over trying to be 100% blend in (which I doubt is possible)
If you want to be anonymous: use Tor.
Of course, the more tech savvy can do a lot more. Balancing indeed, but a bit more involved where I think if given simple ways do the same in the VPN apps people are already familiar using would “raise awareness” (as folks will begin looking into what’s what and why) for all that’s possible to do with your network level changes to improve privacy.
In other words, making the process that’s a lot more involved today with what you’re doing and what’s possible through Pi Hole to also be made possible through VPN apps and their network if the VPN companies developed such feature sets.
I mean, wouldn’t this be the next set of “evolutionary” features of what VPNs are providing as privacy tools (though it does depend on how you have your OPSEC set up for said privacy to really be meaningfully effective).
And yes, I know were not talking about anonymity here.