What does HackerNews think of pi-hole?

A black hole for Internet advertisements

Language: Shell

#27 in Hacktoberfest
#1 in Raspberry Pi
#7 in Shell
Setting up a PiHole is very easy- see https://github.com/pi-hole/pi-hole/#one-step-automated-insta... for options. The hardest part will likely be pointing your router to the new local DNS IP (or at least is was for me, thanks to clunky netgear UI).

On maintenance: there is an included admin console from which you can whitelist or blacklist domains. The external adlists are updated automatically.

The only time I've been frustrated with my PiHole is when I forget it exists and try to use analytics tools (Logrocket, FB analytics) for work. Otherwise haven't noticed any adverse effects on my web experience.

One of the most important thing I miss about having an Android. I moved to iPhone 2 years ago and still use Firefox as my primary browser. But due to the Firefox's lack of addons support on iOS, I have to rely on a self-hosted OpenVPN setup with Pi-Hole[0] installed to get rid of ads and trackers.

[0] https://github.com/pi-hole/pi-hole

Pihole [1] is mostly written in bash, which reads rather well, as far as I am concerned.

[1] https://github.com/pi-hole/pi-hole

You can set up a Pi-Hole (DNS sinkhole) and Pi-VPN (Wireguard installer and CLI-frontend for small deployments) very quickly. And you can do it on any debian VM or computer, not just Pi.

Once you have the base OS ready to go, it will take you less than 30 minutes if you know how to muck with your DHCP/firewall settings in your router.

https://github.com/pi-hole/pi-hole/#one-step-automated-insta...

Install Pi-Hole, then edit your DHCP server to hand out the Pi-Hole as the DNS server.

https://pivpn.io/

After installing Pi-hole, install this. Choose Wireguard, not OpenVPN. port-forward the Wireguard UDP port to your VPN server. use the "pivpn" command to create client configs and the "qr" subcommand to scan the config into your phone.

Me too. Ironic.

Not sure what that page holds but you can find out all about Pi-hole here:

https://github.com/pi-hole/pi-hole

https://github.com/pi-hole/pi-hole

Pi Hole is open source, so if someone did try to sneak in some malicious code, it would be seen.

Self-hosted DNS solution with an easy setup and a nice web GUI to manage it.

https://pi-hole.net/

https://github.com/pi-hole/pi-hole

If you have a Raspberry Pi, look into using Pi-hole[1]. It provides network-wide blocking when installed on your home network by proxying requests. I also use AdGuard Pro[2], which provides a similar function when I'm outside my home network. Both happen to be open source software[3][4], so that's a plus.

[1]: https://pi-hole.net/

[2]: https://adguard.com/en/adguard-ios-pro/overview.html

[3]: https://github.com/pi-hole/pi-hole

[4]: https://github.com/AdguardTeam/AdguardForiOS

For their safety and sanity you may want to set up a network-wide ad blocker like Pi-hole [1].

[1]: https://github.com/pi-hole/pi-hole

I recommend pi-hole if you have a Raspberry Pi laying around: https://github.com/pi-hole/pi-hole
I would reccomend PiHole [1] for something like this.

Not only is it more robust, it acts as a DNS/HTTP server that blocks this kind of stuff on a whole network.

1: https://github.com/pi-hole/pi-hole

You can always review the code for yourself over on our github repo (https://github.com/pi-hole/pi-hole)! As well as the devs, there are so many pairs of eyes on the code that if anything fishy were to happen, everyone would know about it (not to mention it would completely undermine the hard work we've put into it over the past couple of years!)

Updates are manual, too, so unless you intervene, there is no reason that a working system would suddenly become compromised, except if somebody had access to your network. But then you have a different issue...

Or block them at the DNS level for the whole network with something like Pihole[1]

[1] https://github.com/pi-hole/pi-hole