Playing with Pi-hole [1] and PiVPN [2] on a VPS and learned about the Pi-hole Remote iOS app [3] on the subreddit [4]. Wow, it’s really nice! 😍
[1] https://pi-hole.net
[2] https://pivpn.io
[3] https://apps.apple.com/us/app/pi-hole-remote/id1515445551
[4] https://teddit.net/r/pihole
Oh this is helpful, an easy way to check which filter lists contain a given domain.
Pros: increased security due to leveraging threat intelligence feeds across multiple providers.
Cons: latency is coupled to the slowest resolver, and decreased privacy due to sending DNS requests to multiple 3rd party resolvers (rather than one or even none w/ something like Unbound).
I wonder if this idea has been implemented anywhere...
Found a blog post related to that comparison video w/ a more fleshed out script to test DNS blocking effectiveness.
https://www.andryou.com/2020/05/31/comparing-malware-blocking-dns-resolvers-redux/
Source: https://pastebin.com/raw/qNxYF6bp
Some fitler list ideas: https://firebog.net
Added to SSL Server Test 🙂
https://addons.mozilla.org/en-US/firefox/addon/qualys-ssl-server-test/
Watching this video [1] comparing the malware blocking effectiveness of 3rd party DNS resolvers got me thinking...
For some security focused use cases wouldn't it be valuable if there were a way to leverage multiple DNS resolvers with a strategy where DNS requests are sent to multiple resolvers in parallel and responses are returned only once it's determined that no resolver blocked the request? 🤔
[1] https://forums.lawrencesystems.com/t/dns-malware-filtering-compared-quad9-vs-cloudflare-vs-dns-filter-vs-opendns-cisco-umbrella/5072
#Security #Privacy #DNS