relic4322

joined 3 days ago
[–] relic4322@lemmy.ml 1 points 23 minutes ago

In my particular setup, I have an additional constraint and that is that my network has to be designed for portability and travel. Not that it affects your design per say. Thank you for the response. Just something that occurred to me that I hadnt mentioned.

I am living a transient life at the moment. So lots of virtualization and lack of control concerning the WAP and such.

I do like your set up btw.

[–] relic4322@lemmy.ml 1 points 1 hour ago

Yeah, I am pretty close to that, the pihole to unbound, unbound DoT to cloudflare. What I am doing at this point is bypassing the DNS to ISP, but as I stated in my response above, not yet blocking everything on the net from using the regular stuff. Just feasibility testing at the moment.

Love the dual setup for DNS. I set my primary to this and my secondary to just cloudflare at them moment for when I bork my primary DNS will fidgeting with it, haha.

[–] relic4322@lemmy.ml 0 points 1 hour ago

"Dnsbl is only a small component of effective network security. Arguably the firewall is most important and so I have a default deny all for any device on my LAN trying to reach the Internet." 100%, I decided to break up my posts into sub components of the total stack, but to your point currently im enforcing a deny all inbound and outbound at the host level, as the network is shared with the fam and they are not ready for that level of learning (pain, lol)

I just learned about unbound, didnt realize it had a blocklist capability so thats great to know. Gotta dig into it.

I like that last bit, blocking DoT except for the one approved path. Much like TLS 1.3 it offers insider threat protection against inspection. So with that in mind when you said you are using unbound instead of using DoT forwarding, you mean instead of allowing clients to DoT forward, right? Thats what I am doing now as well, though I am not actively blocking it yet. Just currently enabling and testing feasibility on a single host to see the performance and operational impacts of privacy/security implementations.

Curious to your IDS solution, I gotta dig into opnsense. I know about it, its been around a long time, but havent touched it in so long I cant remember its capabilities.

[–] relic4322@lemmy.ml 1 points 2 hours ago

good point. not a huge fan, but better than no option at all. Actually thats probably the best option for now.

[–] relic4322@lemmy.ml 1 points 2 hours ago

I think if you are using any meta app on your phone yes. I would assume yes, if they put in the time to figure out the security bypasses then I cant see why they would limit it to one app. I removed all meta apps from my phone.

[–] relic4322@lemmy.ml 5 points 2 hours ago* (last edited 2 hours ago)

Brutalism and Art Deco, not together obviously, but +1000 points to Affordable Housing @supersquirrel@sopuli.xyz lol

[–] relic4322@lemmy.ml 4 points 2 hours ago

Its funny to qualify and not go after it. After exploration I found the same things. Whats the point? Only thing I could find was hey you can hang out with smart people.

Its lonely being SMRT so this seems like it might be a good thing, but you know what... you put a bunch of smart people in a room and they are all used to being the smartest in a group and its insufferable.

Better to not bring it up, and just find people that share your hobbies tbh.

 

So DNS Black-holing is not new obviously, and what stands out as the go to solution? Pihole probably... and yeah thats what im using because hey its a popular choice. Though I am running it in docker. Combining that with Unbound (also in docker), and configuring outbound DNS to use DNS over TLS, with a few additional minor tweaks, but otherwise mostly standard configuration on both.

Wondering what you guys might be using, and if you are using Pihole and/or Unbound if you have any tips on configuration.

Happy to share my config if there is interest.

[–] relic4322@lemmy.ml 5 points 1 day ago

same for me, codeberg works quite well. no issues at all in comparison to github. slowly moving my code over.

[–] relic4322@lemmy.ml 4 points 1 day ago (2 children)

nice. Im looking to make the transition to graphene OS. would go to linux daily driver if I can get away from MS Office. I do too much writing collaboration with others and it gets wonky going back and forth with office users. Though Denmark is saying they are ditching office so that might incentivize alternatives and such. exciting times.

Im currently working on a whole stack, so docker pi-hole with unbound using dns over tls, squid proxy with maximum privacy, FF fork with ublock, privacy badger, noscript. mullvad and/or tor depending on where and when im using it.

 

At this point it not about passive collection, corporations are going to extreme ends to get our data.

https://www.zeropartydata.es/p/localhost-tracking-explained-it-could

I am interested in what people are doing to enforce their privacy while using the web.

I have some things in place, looking to compare with the community.

(btw, I am new here, this is my first post. So uh… Hi )

[–] relic4322@lemmy.ml 3 points 1 day ago (1 children)

yeah, and extensions additionally work against you in fingerprinting. Though I'm totally interested in what extensions you are using.

[–] relic4322@lemmy.ml 10 points 1 day ago

Ive only started looking into these. GrapheneOS looks cool, but being stuck with only the Pixel is kinda annoying and google is being shitty about supporting it. Removing drivers and squashing git commits, making it harder to support.

I need to look at the others to see how they fair.

[–] relic4322@lemmy.ml 3 points 1 day ago (1 children)

I should mention that DuckDuckGo recently released an android browser and it is privacy focused. I cant tell you how well it does its job BUT the important thing is that it has an experimental feature that creates a virtual network interface that routes coms and blocks phone home attempts and tells you what app is doing what.

I have had it running for a few months and its crazy to see how much traffic is going on without your knowledge.

view more: next ›