I turned on topic DNS logging, but it’s way too much info for my eyes to digest.
What’s interesting is this is just a private house and I’m the only one home. So, the caught ads are either from me or devices that are doing what they do all by themselves.
Whats with github and stephen black? Is Mikrotik supporting this list, using this as a default?
Stated otherwise, what lists are people using, and are they trustworthy, uptodate or effective and how do you know?
Yes and tomorrow, Stephen cashes in his profits from the Trump bitcoin and stops working on the list… how useful will it be tomorrow??
I mean lists are outacontrol…
Why in the world would he do that when he gets $0.0001 every time his list redirects a paying ad to my screen while blocking an “uncooperative” advertiser’s ad from showing up?
It’s not it’s SENDING data to Mr. Black – worse case is some random website doesn’t work if something got on his list which be easily remedied. Since it’s a static file, no info is leaking out from “adlist” either beyond what normal would (i.e. something NOT on the list).
I don’t use any lists… but I do think the COMBO of some “adlist” with one of the protective DNS servers seems entirely reasonably.
I used OpenDNS for a long while – as a low stakes way to always do “something” about malware. But past year+ been switching newer routers to Quad9’s 9.9.9.9. My only thinking is OpenDNS seems to be languishing at the backwoods of cisco, so I worry about future of it. While the Quad9 folks seemed focused on DNS and malware, and independent. Much like the original OpenDNS folks, before they were absorbed by cisco.
Also on same basis as trusting “Steven” for adlist… I watch a video from the Quad9 CEO a while back, he seemed reasonably trustworthy. And, without stereotyping too much, I’d trust the Swiss to run DNS, more than say some these Californians billionaires .
Now I get the logic of DoH to “hide” your request - totally valid. It’s just not my concern - someone, somewhere is collecting the DNS queries is my thought. So I’m not a big fan of introducing TCP’s complexity (three-way handshake) into something so critical like DNS. UDP is going to be faster. Leaking some UDP DNS queries is better than potentially some oddities with DOH (either RouterOS or elsewhere) creeping up. But just my opinion.
Now one of the public DNS server knowing about “bad domains”, and returning NXDOMAIN or whatnot… I do like that part as I’d rather deal with a question about why one website does not work… Than say of all DNS not working because of a bug in DOH - or a PiHole container is down.
I always use 9.9.9.9 as my DNS Service as it provides me basic protections from the worst malicious domains, but it provides no ad blocking and no tuning options. False positives are very rare with it and also no additional CPU cycles consumed.
I tried different block lists with my Unbound setup and I had also Bind running as my recursive Name server with blocklists. Problem is sometimes the quality of the blocklists, you don´t usually know which ones to use, to have sufficient ad blocking but not having too much false positives. It´s also hard to maintain.
I then used a PiHole setup which was great, but after testing AdGuard I found that it has a more versatile GUI and I can have better control. (Maybe Pihole improved since)
What wasn´t mentioned here: all DNS based ad blocking is by far inferior compared to the browser plugins. I use UBlock Origin everywhere, where I can. This provides the best results.
For basic protection and devices like IoT/mobile devices/TVs I still have AdGuard+Quad9, but the emerging issue is, that I can´t block DoH for those.
I don’t concern myself with using DoH, but primarily because I don’t have the depth of understanding to be worried about it. My basic understanding that it encrypts DNS requests and thereby provides greater privacy, but more so that it prevents an attack coming in by way of hijacking a DNS request. (There’s only so much a guy can learn and implement…)
And, I tried implementing browser-based ad protection and it was a nightmare. I personally use 6 or 7 physical devices each with a browser and some of those I frequently use 2 or 3 different browsers (Chrome, Edge, and DuckDuckGo) because they behave differently (i.e., some things and sites work on one but not another) and because the caches screw up my multiple user logins to the same services like gmail and office365. So, maintaining browser-based ad protection would be onerous and ongoing. And, the fine tuning of these ad-blockers was rediculously time-consuming.
And, generally, I place high value on simplicity of set up and a set it and leave approach.
That said, I set up the adlist and it has caught tens of thousands of requests (I don’t actually know what “caught” means) and I just had my first issue:
cnbc.com complained that I am using an ad-blocker and depriving them of revenue. They asked if I could shut it off.
I think this goes to the balance, or compromise, that will inevitably be faced with these types of systems.
I’ll continue using the single Stephen adlist, despite the only feedback or data I get is a complaint that I’m depriving a web site of needed revenue (as opposed to feedback that I am being spared undesired ads).
It would be enough for all users to agree and boycott the products in the EXCESSIVE advertising banners,
sending protest emails to the companies in question, and they would stop advertising in that way, knowing that it would backfire on them…
I understand those who try to earn money with what they do for free,
but there also needs to be a balance,
especially on advertising done on things for which you are already paying the subscription. (I am not referring to the internet subscription).
If “my ISP” made me pay €2.00 more per month to have internet WITHOUT advertising, I would have already signed up… (less power consumed for pihole & Co.).
Too bad that as an ISP (on Italy) I am required by law to block the sites that the government tells me to,
but at the same time I cannot prevent my customers from reaching the others…
(otherwise I would have already put the filter on all the advertising sites for my customers)…
Then in the future, and easily too
(given how people with the “security flag” start using DoH, https and other bullshit that worsen management and do not increase security at all),
I see that web pages will no longer be rendered by the browser,
but interactive images and interactive videos will arrive in which the banners will be integrated into the content and not removable by anything,
since everything will be encrypted and not modifiable on computer, like copy-protected streaming content that is uncompressed on GPU…