to try to* ban it
to try to* ban it
Does he always talk about himself in the third person? I have fascist social networks (all their domains) blocked so I’m not aware of how he writes.
Ohh AVIF, fancy schmancy
Who knows? This is Lemmy
I feel it’s closer to half, so maybe one third are just really, really stupid.
This has been known for several years now yet it seems like nothing is ever done about it.
Of course they are, the evil fucks.
We just went through this in California and it unfortunately didn’t pass. I’m not sure whether the timing will be better or worse for Minnesota.
I blocked outgoing ports 53 and 853 (other than to my resolver) due to this; unfortunately this doesn’t help with DoH.
But one of my favorite things is that you can block Apple News ads by blocking doh.apple.com
: that’s right, the app gets the IP address of the DoH server using the current nameserver before switching to that specified in the DNS record. 😆
I’ve never gotten this to work with iOS devices for several years now. Yes, I’ve made sure that background app refresh is permitted, location services are on, etc.
Nothing about DNS and/or IP blocking it? What’s the point of quitting using the website/app if you’re still letting it stalk you across the web via third-party scripts and hidden pixels?
How are they making a profit doing that? Unless I sell for very low prices (which I do sometimes) it can be difficult to sell even at market price.
As a Millennial it truly feels like all the progress made during my adult life is being reversed. It’s hard to rationalize sticking around in this country at this point.
This is accurate but you don’t need a GL.iNet router to act as the VPN server at home, you just need any device that can act as the server at home.
I’ll never understand how people rationalize this. Stop supporting this inhumane, barbaric industry.
I’m just using WireGuard on a VPS with multiple interfaces. I’m still doing heavy ad/tracking blocking via DNS too.
As for App Connectors I’m working on a script (compiled program hopefully down the road) that can query a specific hostname using a specific interface (say, a US-only website using DNS over a US-based VPN) then create a virtual IP address that directs to that same IP using the correct tunnel.
My reasoning for the virtual IP address is that I don’t want to redirect every website on the host to the other tunnel—lots of servers have an array of websites on them.
What I found disappointing about Tailscale is I had to do a lot of “hacks” to make things work—DNS on each exit node had to match perfectly (despite using different exit tunnels)—then the shit would only work like 20% of the time. One day traffic for the US tunnel worked, the next day it was going out of the exit node. I also never got it working correctly in Docker so I was running multiple VPS servers.
If I remember correctly with App Connectors your client would query the App Connector for the domain, then it would return an IP address. The IP address would be set up to always go through the defined exit node. So if your DNS was off or you were accessing another website on the same server you were screwed. On top of that, it just didn’t work.
🤣