by pierrebarre on 5/19/22, 10:43 AM with 61 comments
by teddyh on 5/19/22, 12:20 PM
1. IIUC, when SNI is encrypted (in TLS 1.3?) almost everything is out the window.
2. Local devices can do DNS over HTTPS (DoH) and DNS over QUIC (DoQ) to look up their stuff, so DNS-based blocking will soon be obsolete.
3. The browser itself is controlled by the biggest ad-vendor around (Google), so you’ll probably get no help there.
The only solutions are:
A. Use browsers not controlled by Google (i.e. not any Chrome fork either).
B. Use only apps and devices locally which do not display ads. (This is, in a way, a generalization of A.)
C. Legislate away the business models of ads and the media and “smart” devices which use ads.
(A very similar argument can be made for user tracking and telemetry.)
by adamzochowski on 5/19/22, 1:18 PM
by mhils on 5/19/22, 1:26 PM
by Saint_Genet on 5/19/22, 12:47 PM
by geoffeg on 5/19/22, 3:12 PM
by cal85 on 5/19/22, 2:27 PM
Edit: I should have read the About section more carefully:
> Privaxy is also way more capable than DNS-based blockers as it is able to operate directly on URLs and to inject resources into web pages.
Makes sense. So it potentially has the fine-grained control of a browser-based blocker but also has good performance like a pihole. Sounds compelling. Now I’m interested to know why it’s not been done this way before? Is it just a hard problem to solve, and no one has attempted it yet?
by 2Gkashmiri on 5/19/22, 12:42 PM
I don't know the reason why the devs of this project think they need to start afresh, there are already tools like Firefox+unlock origin+ pihole which should solve most if not all of the problems. Why not incorporate the defining feature into pihole so that people don't have to add more complexity?
Do I switch off my pihole and set this up?
by randomhodler84 on 5/19/22, 4:41 PM
Cert pinning defeats this on 99% of consumer devices and introduces a security hole in the browser by subverting the trust model. Unless the proxy is doing 100% of the same thing the browser is doing, and it isn’t, you are weakening browser security too.
Instrument the endpoint (browser plug-in) or control name resolution (filtering DNS server that uses DoH to prevent upstream filtering).
by sidpatil on 5/19/22, 1:20 PM
by hereme888 on 5/19/22, 8:23 PM
If I set NextDNS with DoT in my Android under the "private DNS" setting, and turn on the NextDNS setting with DNS rebinding protection, would the phone and some apps still find a way around it?
I also use NetGuard, but it's more cumbersome and doesn't allow DoT.
by bilekas on 5/19/22, 12:29 PM
I'm not sure I understand why it would be more capable than a DNS blocker ?
If it's just because you can inject into the traffic that's comparing apples and oranges ? Or am I missing something ?
by ThePhysicist on 5/19/22, 12:27 PM
by pkulak on 5/19/22, 8:22 PM
"The service may not tolerate TLS interception."
I figured the proxy would be making the request entirely independently. How would an external entity even know the data was later being passed on?
by idrock on 5/19/22, 5:33 PM