various
parent
dce4ddfed9
commit
d61e937965
@ -0,0 +1,61 @@
|
||||
---
|
||||
layout: post
|
||||
title: Blocking ads on mobile and desktop
|
||||
subtitle: Locally getting rid of ads on most™ platforms
|
||||
description: A semi-quick and easy guide on getting rid of ads on most™ platforms (browsers, Android, & iOS)
|
||||
cover: /assets/posts/adblock.png
|
||||
date: 2019-07-20 19:09 -0400
|
||||
---
|
||||
# Forward
|
||||
The more I interact with people who don't care about ads, the more I feel like I need to do something about it. To be quite honest, ads annoy the hell out of me and I can't stand them when I'm listening to audio (podcasts are an exception as long as they aren't **too** intrusive), browsing the web, or watching videos. It's a major inconvenience on both mobile and desktop so this article is aimed at the "normal" user and will cover how to block ads on (*hopefully*) all major platforms. I don't use iOS so I can't test the methods listed nor do I plan to do too much research into it.
|
||||
|
||||
For quick navigation, if you're simply looking for uBlock Origin configuration tips, just jump to the [heading](#ublock-origin-configuration)
|
||||
|
||||
# Desktop
|
||||
The biggest one here is in your browser. In my *personal* opinion, any derivative of Chromium or Chrome isn't *really* worth talking about when it comes to ads because they're an advertising company before anything else and that's one of their main goals. I recommend [Firefox](https://www.mozilla.org/firefox/). It's fast, it's private, it's open source, and Mozilla isn't a company whose sole purpose is serving personalised ads. That said, I still recognise the fact that Chrome dominates the browser market. As such, I'll address it as well.
|
||||
|
||||
## Firefox
|
||||
For general browsing, I recommend [uBlock Origin](https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/). It's fast and lightweight yet very powerful and comprehensive. If you want to go a step further and have the ability to really *curate* your web experience, I recommend using [uMatrix](https://addons.mozilla.org/en-US/firefox/addon/umatrix/) *in addition to* uBlock Origin. It's harder to get used to the workflow and it takes quite a bit of time to develop a good setup but, once you do, it's phenomenal. Check the bottom section for my [configuration](#ublock-origin-configuration) recommendations!
|
||||
|
||||
## Chrome
|
||||
Same as with Firefox, I recommend [uBlock Origin](https://chrome.google.com/webstore/detail/ublock-origin/cjpalhdlnbpafiamejdnhcphjbkeiagm) and [uMatrix](https://chrome.google.com/webstore/detail/umatrix/ogfcmafjalglgifnmanfmnieipoejdcf) together. Check the bottom for my [configuration](#ublock-origin-configuration) recommendations!
|
||||
|
||||
## Safari
|
||||
Again, I recommend Firefox. If you're stuck on Safari, however, [uBlock Origin](https://safari-extensions.apple.com/details/?id=com.el1t.uBlock-3NU33NW2M3) is available as an extension there as well. There's some general information about who develops it on the main [GitHub repo](https://github.com/gorhill/uBlock#safari-macos). For instructions on installing it, read the related [wiki page](https://github.com/el1t/uBlock-Safari/wiki/Installation-and-Updates). If you do use it over Better (below), check the last section for my uBO [configuration](#ublock-origin-configuration) recommendations.
|
||||
|
||||
You can also use [Better](https://better.fyi/) from [Aral Balkan](https://mastodon.ar.al/@aral). This is probably the . . . *Better* 😏 choice as Safari is known to disable uBlock Origin because it's "too heavy". I don't use macOS or iOS so I don't have any personal experience. I got some suggestions from other people, went through them, and chose two of the better ones.
|
||||
|
||||
A close friend of mine is currently testing [AdGuard](https://apps.apple.com/app/apple-store/id1047223162), a free adblocker. I'll update this once she reaches a verdict.
|
||||
|
||||
# Mobile
|
||||
Phones are typically more limited than desktops so blocking ads here is a bit more difficult. In the past, the Firefox Android app had support for extensions but, starting with version 70, that will be no more. Other than that, the only decent way is to use VPN or DNS techniques. I prefer Android but I know iOS is also popular so I tried to find some solutions for it as well.
|
||||
|
||||
## Android
|
||||
### Rooted phones
|
||||
If you have a rooted phone, [AdAway](https://adaway.org/) is 100% the way to go. It blocks ads not just in your browser but in every app as well. You can also define custom blocklists like the one I have at [/hosts.txt](/hosts.txt). Tap the <i class="fa fa-bars"></i> menu in the top right then `Hosts sources`. In the box, type `nixnet.xyz/hosts.txt`. Go back to the homescreen, enable/refresh, reboot, then enjoy ad-free Android!
|
||||
|
||||
### Non-rooted phones
|
||||
If you **don't** have a rooted phone, try [Nebulo](https://smokescreen.app/). If you use F-Droid (which I also highly recommend), the repo is at `fdroid.frostnerd.com`. The source code for the app can be found on their [GitLab](https://git.frostnerd.com/PublicAndroidApps/smokescreen) instance as well. Nebulo is an app that lets you use DNS-over-TLS and DNS-over-HTTPS on Android. To actually block ads with it, there are a few steps you have to go through first. If you use F-Droid (recommended), follow that guide. If you stick to Google Play, follow that guide.
|
||||
|
||||
#### F-Droid
|
||||
In F-Droid, go to Settings > My Apps > Repositories then click the `+` button. Type `fdroid.frostnerd.com` in the box then `ADD`. Wait for your repos to update then search for `Nebulo` and install!
|
||||
|
||||
Open the app, open the <i class="fa fa-bars"></i> menu in the top right, tap DNS Rules, enable AdAway, CoinBlockerList, and Energized Basic, tap the <i class="fa fa-refresh"></i> icon, then toggle DNS Rules in the top right. Go back to the homescreen, tap the <i class="fa fa-server"></i> icon, pick which server you want to use (I recommend [mine](/dns/) or [UncensoredDNS](https://blog.uncensoreddns.org/)). Finally, tap start! You shouldn't see ads in any apps now!
|
||||
|
||||
You *can* just use `fdroid.frostnerd.com` but I recommend using the link with the fingerprint for additional security:
|
||||
`https://fdroid.frostnerd.com/fdroid/repo?fingerprint=74BB580F263EC89E15C207298DEC861B5069517550FE0F1D852F16FA611D2D26`
|
||||
|
||||
There's actually a simpler way to add hosts and it works in both the F-Droid and Google Play versions. The section below details that.
|
||||
|
||||
#### Google Play
|
||||
Google doesn't like apps that block ads (being an advertising company and all). As such, the Play Store version doesn't have blocklists included by default; you'll have to add them manually. I have my own hosts file at [/hosts.txt](/hosts.txt) that you can use. All you have to do is follow everything in the second paragraph of the F-Droid section except you'll tap the <i class="fa fa-plus"></i> icon instead of enabling the host sources. For the name, type something like NixNet lists. In the URL entry field, type `https://nixnet.xyz/hosts.txt`. Tap the add button, tap the <i class="fa fa-refresh"></i> icon, then follow the rest of the F-Droid section.
|
||||
|
||||
## iOS
|
||||
As I mentioned above, [Better](https://better.fyi) is what I would use if I was on iOS or macOS. I've heard good things about it from people and I think Aral is a trustworthy guy.
|
||||
|
||||
A close friend of mine is currently testing [AdGuard](https://apps.apple.com/app/apple-store/id1047223162), a free adblocker. I'll update this once she reaches a verdict.
|
||||
|
||||
# uBlock Origin Configuration
|
||||
In my opinion, uBO is one of the most powerful adblocking tools there is. It has sane defaults for the new user, the settings are easy to understand nad navigate through, and there are many advanced features for people who know what they're doing. **Protip:** if there's an add on a page that you don't want to see, click the extension icon, then the <i class="fa fa-eyedropper"></i> icon, then find the element you want removed, click it, then click `Create`. That will hide the element in the future 👍
|
||||
|
||||
Personally, I recommend enabling the majority of the filter lists. I have all the Built-in lists enabled, Ads, Privacy, Malware domains, Annoyances, and Multipurpose. I've also added my own [hosts file](/hosts.txt) (generated with [`hblock`](https://github.com/hectorm/hblock)) in the custom section. Other than enabling additional lists, my setup is the same as default!
|
@ -0,0 +1,107 @@
|
||||
---
|
||||
layout: post
|
||||
title: Setting DoT on mobile and desktop
|
||||
subtitle: Enhancing your personal privacy by setting custom DoT servers on all your devices
|
||||
description: Enhancing your personal privacy by setting custom DoT servers on all your devices
|
||||
cover: /assets/pages/dns.png
|
||||
date: 2019-07-20 19:09 -0400
|
||||
---
|
||||
Changing your default DNS servers to ones that use DNS-over-TLS can do a lot to make your systems more secure and private. DNS is also a serious tool for censorship and tracking if used foolishly. Before choosing a provider, make ***sure*** you actually read their privacy policy and terms of service. There are some good recommendations [here](https://wiki.lelux.fi/dns/resolvers/) (I'm partial to UncensoredDNS) and of course I have to shill [my own](/dns/). Once you've chosen a provider, you'll need to get set up.
|
||||
|
||||
# Basic Information
|
||||
For the *very* basics, I recommend reading sections 1 - 2 of a [previous post](/blog/dns-and-root-certificates-what-you-need-to-know/#1-what-is-dns-and-why-does-it-concern-you). It has good information and sets you up for this article.
|
||||
|
||||
Another useful term to know is [Anycast](https://en.wikipedia.org/wiki/Anycast). A lot of servers (including mine) have it set up so you only have to set and remember one IP address or hostname and you automatically use the server geographically nearest to you, the one with the lowest latency.
|
||||
|
||||
DoT stands for [DNS-over-TLS](https://en.wikipedia.org/wiki/DNS_over_TLS). It's a protocol that wraps DNS queries and responses in the [TLS](https://en.wikipedia.org/wiki/Transport_Layer_Security) protocol. By default, most systems use plaintext DNS and this is very insecure. Plaintext is . . . plaintext; anyone can snoop on your connection and see what websites you're visiting. If you're using DNS-over-TLS, the only parties that know where you're going is you and the DNS server itself. This article focuses on that because it's more secure and private. DNS-over-HTTPS ([DoH](https://en.wikipedia.org/wiki/DNS_over_HTTPS)) is another option but far fewer clients support it, it's more difficult to set up, and there are far fewer DoH providers.
|
||||
|
||||
# Setup
|
||||
Linux, Windows, and Android are all fairly simple to set up. I don't have any Apple products so I the information there likely won't be complete or particularly good. I still recommend reading it, however.
|
||||
|
||||
## Linux
|
||||
[Unbound](https://wiki.archlinux.org/index.php/Unbound) is what I use for DNS on all of my systems. It's wonderfully easy to use and works very well. Once you've used it for a while and have built up a cache, it's much faster than third-party resolvers.
|
||||
|
||||
*(stolen from [here](https://wiki.lelux.fi/dns-over-tls/unbound/linux/))*
|
||||
|
||||
Filename: `/etc/unbound/unbound.conf`
|
||||
|
||||
|
||||
### Debian
|
||||
|
||||
```
|
||||
include: "/etc/unbound/unbound.conf.d/*.conf"
|
||||
|
||||
server:
|
||||
tls-cert-bundle: /etc/ssl/certs/ca-certificates.crt
|
||||
|
||||
forward-zone:
|
||||
name: "."
|
||||
forward-tls-upstream: yes
|
||||
|
||||
forward-addr: 198.251.90.114@853#uncensored.any.nixnet.xyz
|
||||
forward-addr: 212.83.138.44@853#resolver1.lelux.fi
|
||||
forward-addr: 91.239.100.100@853#anycast.censurfridns.dk
|
||||
forward-addr: 185.95.218.42@853#dns.digitale-gesellschaft.ch
|
||||
```
|
||||
|
||||
### Arch
|
||||
|
||||
```
|
||||
include: "/etc/unbound/unbound.conf.d/*.conf"
|
||||
|
||||
server:
|
||||
use-syslog: yes
|
||||
do-daemonize: no
|
||||
username: "unbound"
|
||||
directory: "/etc/unbound"
|
||||
# TODO: fix DNSSEC check
|
||||
# trust-anchor-file: trusted-key.key
|
||||
tls-cert-bundle: /etc/ssl/certs/ca-certificates.crt
|
||||
|
||||
forward-zone:
|
||||
name: "."
|
||||
forward-tls-upstream: yes
|
||||
|
||||
forward-addr: 198.251.90.114@853#uncensored.any.nixnet.xyz
|
||||
forward-addr: 212.83.138.44@853#resolver1.lelux.fi
|
||||
forward-addr: 91.239.100.100@853#anycast.censurfridns.dk
|
||||
forward-addr: 185.95.218.42@853#dns.digitale-gesellschaft.ch
|
||||
```
|
||||
|
||||
### Using Unbound as a local resolver
|
||||
```bash
|
||||
echo "nameserver 127.0.0.1" | sudo tee /etc/resolv.conf && sudo chattr +i /etc/resolv.conf
|
||||
```
|
||||
This sets `127.0.0.1` as your nameserver and locks the file by adding the *immutable* flag (`chattr +i`). To remove the flag and make it editable again, run `chattr -i /etc/resolv.conf`.
|
||||
|
||||
## Windows
|
||||
I know the title is for DNS-over-TLS but, from what I've found, DoT on Windows is **incredibly** difficult and I can't find much on it. This tell you how to change your plaintext DNS configuration.
|
||||
1. Open the **Control Panel**
|
||||
2. Click **Network and Internet**
|
||||
3. Click **Network and Sharing Center**
|
||||
4. Click **Change adapter settings** in the left pane
|
||||
5. Right-click the network interface connected to the internet, and select the **Properties** option
|
||||
6. Select and check the **Internet Protocol Version 4 (TCP/IPv4)** option
|
||||
7. Click the **Properties** button
|
||||
8. Click **Use the following DNS server addresses**
|
||||
9. Enter your primary and secondary DNS addresses. If you're using mine, the primary would be `198.251.90.114` and secondary would be from some other provider (such as [UncensoredDNS's](https://blog.uncensoreddns.org/dns-servers/) `91.239.100.100`)
|
||||
10. Click **OK**
|
||||
11. As with all things Windows, **reboot** to finish applying the changes.
|
||||
|
||||
## macOS
|
||||
I got this tutorial from [phiffer.org](https://phiffer.org/writing/dns-over-tls-on-macos/). I don't have anything from Apple so I can't test it but a friend of mine did and said it works.
|
||||
|
||||
1. Use [Homebrew](https://brew.sh/) to install `knot-resolver` then set up a service so it runs on startup with `sudo brew services start knot-resolver`
|
||||
2. Use your favourite text editor to modify `/usr/local/etc/kresd/config` and add this to the very end of the file: `{% raw %}policy.add(policy.all(policy.TLS_FORWARD({{'198.251.90.114', hostname='uncensored.any.dns.nixnet.xyz'}}))){% endraw %}`
|
||||
3. Restart `kresd` with `sudo brew services restart knot-resolver`
|
||||
4. At this point, you should check what DNS server you're currently using to make sure it actually changes. You can do that with `kdig nixnet.xyz`
|
||||
5. Go to Apple **Menu** > **System Preferences** > **Advanced** > **DNS** then add `127.0.0.1`
|
||||
6. Test again with `kdig nixnet.xyz`. This time, one of the last couple IP addresses you see should show up something like `127.0.0.1@53(UDP)`.
|
||||
|
||||
That's it!
|
||||
|
||||
## Android
|
||||
Note that DoT is only available on Android Pie and up. For other versions, try [Nebulo](https://smokescreen.app). I go over the process of installing and using it in my last [post](/blog/blocking-ads-on-mobile-and-desktop/#non-rooted-phones). Once you've gone through that, you're pretty much good to. If you want to add additional servers tap the <i class="fa fa-server"></i> server icon, then the plus at the bottom, and add whatever IP addresses or hostnames you'd like. Mine is included by default as **NixNet Uncensored** so all you have to do is select it.
|
||||
|
||||
# iOS
|
||||
As far as I've been able to find, you can't. I'm sorry ¯\\\_(ツ)\_/¯
|
Binary file not shown.
After Width: | Height: | Size: 4.8 KiB |
Binary file not shown.
After Width: | Height: | Size: 6.6 KiB |
@ -0,0 +1,123 @@
|
||||
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
|
||||
<!-- Created with Inkscape (http://www.inkscape.org/) -->
|
||||
|
||||
<svg
|
||||
xmlns:dc="http://purl.org/dc/elements/1.1/"
|
||||
xmlns:cc="http://creativecommons.org/ns#"
|
||||
xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
|
||||
xmlns:svg="http://www.w3.org/2000/svg"
|
||||
xmlns="http://www.w3.org/2000/svg"
|
||||
xmlns:xlink="http://www.w3.org/1999/xlink"
|
||||
xmlns:sodipodi="http://sodipodi.sourceforge.net/DTD/sodipodi-0.dtd"
|
||||
xmlns:inkscape="http://www.inkscape.org/namespaces/inkscape"
|
||||
width="600"
|
||||
height="315"
|
||||
viewBox="0 0 158.75 83.343752"
|
||||
version="1.1"
|
||||
id="svg8"
|
||||
inkscape:version="0.92.4 5da689c313, 2019-01-14"
|
||||
sodipodi:docname="dns.svg"
|
||||
inkscape:export-filename="/home/amolith/repos/nixnet/assets/pages/dns.png"
|
||||
inkscape:export-xdpi="96"
|
||||
inkscape:export-ydpi="96">
|
||||
<defs
|
||||
id="defs2">
|
||||
<symbol
|
||||
id="shield-alt">
|
||||
<title
|
||||
id="shield-alt-title">Alternate Shield</title>
|
||||
<path
|
||||
style="stroke-width:0.26458332"
|
||||
inkscape:connector-curvature="0"
|
||||
d="m 131.23333,33.866667 c 0,58.547529 -35.965868,91.187323 -58.615524,100.623153 a 12.7,12.7 0 0 1 -9.76921,0 C 34.526802,122.69073 4.2333333,86.383019 4.2333333,33.866667 A 12.7,12.7 0 0 1 12.04886,22.143508 l 50.8,-21.16666633 a 12.7,12.7 0 0 1 9.769211,0 L 123.41807,22.143508 a 12.7,12.7 0 0 1 7.81526,11.723159 z m -63.499997,84.220313 0.01746,0.009 C 92.551515,105.74285 113.39063,76.739485 114.26904,36.676012 L 67.733333,17.286023 Z"
|
||||
id="path26851" />
|
||||
</symbol>
|
||||
<symbol
|
||||
id="user-secret">
|
||||
<title
|
||||
id="user-secret-title">User Secret</title>
|
||||
<path
|
||||
style="stroke-width:0.26458332"
|
||||
inkscape:connector-curvature="0"
|
||||
d="m 102.87767,78.137808 5.54884,-14.565841 c 0.79164,-2.078038 -0.74321,-4.3053 -2.96703,-4.3053 H 90.061521 c 1.971146,-4.295775 3.071812,-9.074415 3.071812,-14.111023 0,-0.960702 -0.04233,-1.91135 -0.12065,-2.851679 10.461357,-2.067719 17.053987,-5.081323 17.053987,-8.437298 0,-3.509169 -7.20487,-6.644217 -18.506814,-8.714582 C 89.129658,16.472429 84.36901,7.7432958 80.78761,3.2313563 78.286769,0.08069792 73.942046,-0.90513958 70.344242,0.89402708 L 63.053119,4.5397208 a 8.4658729,8.4658729 0 0 1 -7.572904,0 L 48.189092,0.8937625 C 44.591023,-0.90513958 40.2463,0.08043333 37.745723,3.2310917 34.164323,7.7430313 29.403675,16.472165 26.973477,25.151821 15.671535,27.22245 8.4666667,30.357498 8.4666667,33.866667 c 0,3.355975 6.5926233,6.369579 17.0539833,8.437298 A 34.227029,34.227029 0 0 0 25.4,45.155644 c 0,5.036873 1.100402,9.815512 3.071283,14.111023 H 13.281554 c -2.279385,0 -3.8160852,2.330714 -2.918089,4.425685 L 16.42401,77.833537 C 6.8259854,81.460446 0,90.73224 0,101.6 v 27.51667 c 0,3.50705 2.8429479,6.35 6.35,6.35 h 105.83333 c 3.50706,0 6.35,-2.84295 6.35,-6.35 V 101.6 c 0,-10.575396 -6.46377,-19.640285 -15.65566,-23.462192 z m -54.194337,50.978862 -12.7,-50.800003 12.7,6.35 6.35,10.583333 z m 21.166667,0 L 63.5,95.25 l 6.35,-10.583333 12.7,-6.35 z M 84.343346,48.750537 c -0.0021,0.01138 -1.137444,0.854869 -1.35599,1.526911 -1.021556,3.139017 -1.858962,6.501342 -4.369329,8.826235 -2.664619,2.467769 -12.688623,5.92799 -16.932275,-6.622256 -0.750623,-2.221177 -4.087019,-2.221971 -4.837906,0 -4.488127,13.273617 -14.821694,8.576998 -16.932275,6.622256 -2.510367,-2.324629 -3.347773,-5.687218 -4.369329,-8.826235 -0.218546,-0.672042 -1.354138,-1.515533 -1.35599,-1.526911 -0.146579,-0.773906 -0.259556,-1.556808 -0.322792,-2.341562 -0.08176,-1.018117 2.666471,-0.967846 2.931055,-0.991394 6.959335,-0.615421 13.838502,-0.153194 20.643585,1.454415 0.678127,0.160337 3.056731,0.139964 3.649398,0 6.805083,-1.607608 13.68425,-2.0701 20.643585,-1.454415 0.265113,0.02355 3.012811,-0.02699 2.931054,0.991394 -0.06324,0.784754 -0.176212,1.567656 -0.322791,2.341562 z"
|
||||
id="path23532" />
|
||||
</symbol>
|
||||
<symbol
|
||||
id="ic_router_24px">
|
||||
<path
|
||||
style="stroke-width:1"
|
||||
inkscape:connector-curvature="0"
|
||||
d="M 5.3445833,1.5610417 5.55625,1.349375 C 5.1858333,0.97895833 4.7095833,0.79375 4.2333333,0.79375 c -0.47625,0 -0.9525,0.18520833 -1.3229166,0.555625 L 3.1220833,1.5610417 C 3.4395833,1.27 3.8364583,1.11125 4.2333333,1.11125 c 0.396875,0 0.79375,0.15875 1.11125,0.4497917 z m -0.238125,0.2116666 c -0.238125,-0.238125 -0.555625,-0.3704166 -0.873125,-0.3704166 -0.3175,0 -0.635,0.1322916 -0.873125,0.3704166 L 3.571875,1.984375 C 3.7570833,1.7991667 3.9952083,1.7197917 4.2333333,1.7197917 c 0.238125,0 0.47625,0.079375 0.6614584,0.2645833 z m -0.079375,1.666875 H 4.4979167 V 2.38125 H 3.96875 V 3.4395833 H 1.3229167 C 1.031875,3.4395833 0.79375,3.6777083 0.79375,3.96875 v 1.0583333 c 0,0.2910417 0.238125,0.5291667 0.5291667,0.5291667 H 5.0270833 C 5.318125,5.55625 5.55625,5.318125 5.55625,5.0270833 V 3.96875 c 0,-0.2910417 -0.238125,-0.5291667 -0.5291667,-0.5291667 z M 2.1166667,4.7625 H 1.5875 V 4.2333333 h 0.5291667 z m 0.9260416,0 H 2.5135417 V 4.2333333 h 0.5291666 z m 0.9260417,0 H 3.4395833 V 4.2333333 H 3.96875 Z"
|
||||
id="path11836" />
|
||||
</symbol>
|
||||
</defs>
|
||||
<sodipodi:namedview
|
||||
id="base"
|
||||
pagecolor="#ffffff"
|
||||
bordercolor="#666666"
|
||||
borderopacity="1.0"
|
||||
inkscape:pageopacity="0.0"
|
||||
inkscape:pageshadow="2"
|
||||
inkscape:zoom="0.7"
|
||||
inkscape:cx="301.7569"
|
||||
inkscape:cy="130.61538"
|
||||
inkscape:document-units="mm"
|
||||
inkscape:current-layer="layer1"
|
||||
showgrid="false"
|
||||
units="px"
|
||||
inkscape:snap-bbox="true"
|
||||
inkscape:bbox-paths="true"
|
||||
inkscape:bbox-nodes="true"
|
||||
inkscape:snap-bbox-edge-midpoints="true"
|
||||
inkscape:snap-bbox-midpoints="true"
|
||||
inkscape:object-paths="true"
|
||||
inkscape:snap-intersection-paths="true"
|
||||
inkscape:snap-smooth-nodes="true"
|
||||
inkscape:snap-midpoints="true"
|
||||
inkscape:window-width="1336"
|
||||
inkscape:window-height="698"
|
||||
inkscape:window-x="15"
|
||||
inkscape:window-y="35"
|
||||
inkscape:window-maximized="0"
|
||||
fit-margin-top="0"
|
||||
fit-margin-left="0"
|
||||
fit-margin-right="0"
|
||||
fit-margin-bottom="0" />
|
||||
<metadata
|
||||
id="metadata5">
|
||||
<rdf:RDF>
|
||||
<cc:Work
|
||||
rdf:about="">
|
||||
<dc:format>image/svg+xml</dc:format>
|
||||
<dc:type
|
||||
rdf:resource="http://purl.org/dc/dcmitype/StillImage" />
|
||||
<dc:title></dc:title>
|
||||
</cc:Work>
|
||||
</rdf:RDF>
|
||||
</metadata>
|
||||
<g
|
||||
inkscape:label="Layer 1"
|
||||
inkscape:groupmode="layer"
|
||||
id="layer1"
|
||||
transform="translate(5.0862632e-6,-213.65623)">
|
||||
<rect
|
||||
style="opacity:1;fill:#323232;fill-opacity:1;stroke:none;stroke-width:1.84040475;stroke-miterlimit:4;stroke-dasharray:none;stroke-dashoffset:0;stroke-opacity:1"
|
||||
id="rect99612"
|
||||
width="158.75"
|
||||
height="83.34375"
|
||||
x="-5.0862632e-06"
|
||||
y="213.65623"
|
||||
inkscape:export-filename="/home/amolith/repos/nixnet/assets/posts/privacy.png"
|
||||
inkscape:export-xdpi="96"
|
||||
inkscape:export-ydpi="96" />
|
||||
<use
|
||||
id="use101699"
|
||||
transform="matrix(8.2538478,0,0,8.2538478,53.169028,227.00546)"
|
||||
style="fill:#ffffff;stroke:none;stroke-width:0.1211556"
|
||||
xlink:href="#ic_router_24px"
|
||||
x="0"
|
||||
y="0"
|
||||
width="100%"
|
||||
height="100%" />
|
||||
</g>
|
||||
</svg>
|
After Width: | Height: | Size: 7.1 KiB |
@ -0,0 +1,189 @@
|
||||
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
|
||||
<!-- Created with Inkscape (http://www.inkscape.org/) -->
|
||||
|
||||
<svg
|
||||
xmlns:dc="http://purl.org/dc/elements/1.1/"
|
||||
xmlns:cc="http://creativecommons.org/ns#"
|
||||
xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
|
||||
xmlns:svg="http://www.w3.org/2000/svg"
|
||||
xmlns="http://www.w3.org/2000/svg"
|
||||
xmlns:xlink="http://www.w3.org/1999/xlink"
|
||||
xmlns:sodipodi="http://sodipodi.sourceforge.net/DTD/sodipodi-0.dtd"
|
||||
xmlns:inkscape="http://www.inkscape.org/namespaces/inkscape"
|
||||
width="600"
|
||||
height="315"
|
||||
viewBox="0 0 158.75 83.343752"
|
||||
version="1.1"
|
||||
id="svg8"
|
||||
inkscape:version="0.92.4 5da689c313, 2019-01-14"
|
||||
sodipodi:docname="ublock.svg"
|
||||
inkscape:export-filename="/home/amolith/repos/nixnet/assets/posts/adblock.png"
|
||||
inkscape:export-xdpi="96"
|
||||
inkscape:export-ydpi="96">
|
||||
<defs
|
||||
id="defs2">
|
||||
<symbol
|
||||
id="shield-alt">
|
||||
<title
|
||||
id="shield-alt-title">Alternate Shield</title>
|
||||
<path
|
||||
style="stroke-width:0.26458332"
|
||||
inkscape:connector-curvature="0"
|
||||
d="m 131.23333,33.866667 c 0,58.547529 -35.965868,91.187323 -58.615524,100.623153 a 12.7,12.7 0 0 1 -9.76921,0 C 34.526802,122.69073 4.2333333,86.383019 4.2333333,33.866667 A 12.7,12.7 0 0 1 12.04886,22.143508 l 50.8,-21.16666633 a 12.7,12.7 0 0 1 9.769211,0 L 123.41807,22.143508 a 12.7,12.7 0 0 1 7.81526,11.723159 z m -63.499997,84.220313 0.01746,0.009 C 92.551515,105.74285 113.39063,76.739485 114.26904,36.676012 L 67.733333,17.286023 Z"
|
||||
id="path26851" />
|
||||
</symbol>
|
||||
<symbol
|
||||
id="user-secret">
|
||||
<title
|
||||
id="user-secret-title">User Secret</title>
|
||||
<path
|
||||
style="stroke-width:0.26458332"
|
||||
inkscape:connector-curvature="0"
|
||||
d="m 102.87767,78.137808 5.54884,-14.565841 c 0.79164,-2.078038 -0.74321,-4.3053 -2.96703,-4.3053 H 90.061521 c 1.971146,-4.295775 3.071812,-9.074415 3.071812,-14.111023 0,-0.960702 -0.04233,-1.91135 -0.12065,-2.851679 10.461357,-2.067719 17.053987,-5.081323 17.053987,-8.437298 0,-3.509169 -7.20487,-6.644217 -18.506814,-8.714582 C 89.129658,16.472429 84.36901,7.7432958 80.78761,3.2313563 78.286769,0.08069792 73.942046,-0.90513958 70.344242,0.89402708 L 63.053119,4.5397208 a 8.4658729,8.4658729 0 0 1 -7.572904,0 L 48.189092,0.8937625 C 44.591023,-0.90513958 40.2463,0.08043333 37.745723,3.2310917 34.164323,7.7430313 29.403675,16.472165 26.973477,25.151821 15.671535,27.22245 8.4666667,30.357498 8.4666667,33.866667 c 0,3.355975 6.5926233,6.369579 17.0539833,8.437298 A 34.227029,34.227029 0 0 0 25.4,45.155644 c 0,5.036873 1.100402,9.815512 3.071283,14.111023 H 13.281554 c -2.279385,0 -3.8160852,2.330714 -2.918089,4.425685 L 16.42401,77.833537 C 6.8259854,81.460446 0,90.73224 0,101.6 v 27.51667 c 0,3.50705 2.8429479,6.35 6.35,6.35 h 105.83333 c 3.50706,0 6.35,-2.84295 6.35,-6.35 V 101.6 c 0,-10.575396 -6.46377,-19.640285 -15.65566,-23.462192 z m -54.194337,50.978862 -12.7,-50.800003 12.7,6.35 6.35,10.583333 z m 21.166667,0 L 63.5,95.25 l 6.35,-10.583333 12.7,-6.35 z M 84.343346,48.750537 c -0.0021,0.01138 -1.137444,0.854869 -1.35599,1.526911 -1.021556,3.139017 -1.858962,6.501342 -4.369329,8.826235 -2.664619,2.467769 -12.688623,5.92799 -16.932275,-6.622256 -0.750623,-2.221177 -4.087019,-2.221971 -4.837906,0 -4.488127,13.273617 -14.821694,8.576998 -16.932275,6.622256 -2.510367,-2.324629 -3.347773,-5.687218 -4.369329,-8.826235 -0.218546,-0.672042 -1.354138,-1.515533 -1.35599,-1.526911 -0.146579,-0.773906 -0.259556,-1.556808 -0.322792,-2.341562 -0.08176,-1.018117 2.666471,-0.967846 2.931055,-0.991394 6.959335,-0.615421 13.838502,-0.153194 20.643585,1.454415 0.678127,0.160337 3.056731,0.139964 3.649398,0 6.805083,-1.607608 13.68425,-2.0701 20.643585,-1.454415 0.265113,0.02355 3.012811,-0.02699 2.931054,0.991394 -0.06324,0.784754 -0.176212,1.567656 -0.322791,2.341562 z"
|
||||
id="path23532" />
|
||||
</symbol>
|
||||
<symbol
|
||||
id="ic_router_24px">
|
||||
<path
|
||||
style="stroke-width:1"
|
||||
inkscape:connector-curvature="0"
|
||||
d="M 5.3445833,1.5610417 5.55625,1.349375 C 5.1858333,0.97895833 4.7095833,0.79375 4.2333333,0.79375 c -0.47625,0 -0.9525,0.18520833 -1.3229166,0.555625 L 3.1220833,1.5610417 C 3.4395833,1.27 3.8364583,1.11125 4.2333333,1.11125 c 0.396875,0 0.79375,0.15875 1.11125,0.4497917 z m -0.238125,0.2116666 c -0.238125,-0.238125 -0.555625,-0.3704166 -0.873125,-0.3704166 -0.3175,0 -0.635,0.1322916 -0.873125,0.3704166 L 3.571875,1.984375 C 3.7570833,1.7991667 3.9952083,1.7197917 4.2333333,1.7197917 c 0.238125,0 0.47625,0.079375 0.6614584,0.2645833 z m -0.079375,1.666875 H 4.4979167 V 2.38125 H 3.96875 V 3.4395833 H 1.3229167 C 1.031875,3.4395833 0.79375,3.6777083 0.79375,3.96875 v 1.0583333 c 0,0.2910417 0.238125,0.5291667 0.5291667,0.5291667 H 5.0270833 C 5.318125,5.55625 5.55625,5.318125 5.55625,5.0270833 V 3.96875 c 0,-0.2910417 -0.238125,-0.5291667 -0.5291667,-0.5291667 z M 2.1166667,4.7625 H 1.5875 V 4.2333333 h 0.5291667 z m 0.9260416,0 H 2.5135417 V 4.2333333 h 0.5291666 z m 0.9260417,0 H 3.4395833 V 4.2333333 H 3.96875 Z"
|
||||
id="path11836" />
|
||||
</symbol>
|
||||
<linearGradient
|
||||
id="linearGradient6915">
|
||||
<stop
|
||||
style="stop-color:#600000;stop-opacity:1;"
|
||||
offset="0"
|
||||
id="stop6917" />
|
||||
<stop
|
||||
style="stop-color:#700000;stop-opacity:1;"
|
||||
offset="1"
|
||||
id="stop6919" />
|
||||
</linearGradient>
|
||||
<linearGradient
|
||||
id="linearGradient6898">
|
||||
<stop
|
||||
id="stop6900"
|
||||
offset="0"
|
||||
style="stop-color:#90000f;stop-opacity:0.94117647;" />
|
||||
<stop
|
||||
id="stop6902"
|
||||
offset="1"
|
||||
style="stop-color:#800000;stop-opacity:1;" />
|
||||
</linearGradient>
|
||||
<linearGradient
|
||||
id="linearGradient3770"
|
||||
inkscape:collect="always">
|
||||
<stop
|
||||
id="stop3772"
|
||||
offset="0"
|
||||
style="stop-color:#000000;stop-opacity:1;" />
|
||||
<stop
|
||||
id="stop3774"
|
||||
offset="1"
|
||||
style="stop-color:#000000;stop-opacity:0;" />
|
||||
</linearGradient>
|
||||
<inkscape:path-effect
|
||||
effect="spiro"
|
||||
id="path-effect3995"
|
||||
is_visible="true" />
|
||||
<radialGradient
|
||||
gradientUnits="userSpaceOnUse"
|
||||
gradientTransform="matrix(1,0,0,1.2584318,0,-20.947238)"
|
||||
r="22.573323"
|
||||
fy="81.055197"
|
||||
fx="82.145422"
|
||||
cy="81.055197"
|
||||
cx="82.145422"
|
||||
id="radialGradient3776"
|
||||
xlink:href="#linearGradient3770"
|
||||
inkscape:collect="always" />
|
||||
</defs>
|
||||
<sodipodi:namedview
|
||||
id="base"
|
||||
pagecolor="#ffffff"
|
||||
bordercolor="#666666"
|
||||
borderopacity="1.0"
|
||||
inkscape:pageopacity="0.0"
|
||||
inkscape:pageshadow="2"
|
||||
inkscape:zoom="0.98994949"
|
||||
inkscape:cx="264.13935"
|
||||
inkscape:cy="141.72818"
|
||||
inkscape:document-units="mm"
|
||||
inkscape:current-layer="layer1"
|
||||
showgrid="false"
|
||||
units="px"
|
||||
inkscape:snap-bbox="true"
|
||||
inkscape:bbox-paths="true"
|
||||
inkscape:bbox-nodes="true"
|
||||
inkscape:snap-bbox-edge-midpoints="true"
|
||||
inkscape:snap-bbox-midpoints="true"
|
||||
inkscape:object-paths="true"
|
||||
inkscape:snap-intersection-paths="true"
|
||||
inkscape:snap-smooth-nodes="true"
|
||||
inkscape:snap-midpoints="true"
|
||||
inkscape:window-width="1336"
|
||||
inkscape:window-height="698"
|
||||
inkscape:window-x="15"
|
||||
inkscape:window-y="35"
|
||||
inkscape:window-maximized="0"
|
||||
fit-margin-top="0"
|
||||
fit-margin-left="0"
|
||||
fit-margin-right="0"
|
||||
fit-margin-bottom="0" />
|
||||
<metadata
|
||||
id="metadata5">
|
||||
<rdf:RDF>
|
||||
<cc:Work
|
||||
rdf:about="">
|
||||
<dc:format>image/svg+xml</dc:format>
|
||||
<dc:type
|
||||
rdf:resource="http://purl.org/dc/dcmitype/StillImage" />
|
||||
<dc:title></dc:title>
|
||||
</cc:Work>
|
||||
</rdf:RDF>
|
||||
</metadata>
|
||||
<g
|
||||
inkscape:label="Layer 1"
|
||||
inkscape:groupmode="layer"
|
||||
id="layer1"
|
||||
transform="translate(5.0862632e-6,-213.65623)">
|
||||
<rect
|
||||
style="opacity:1;fill:#323232;fill-opacity:1;stroke:none;stroke-width:1.84040475;stroke-miterlimit:4;stroke-dasharray:none;stroke-dashoffset:0;stroke-opacity:1"
|
||||
id="rect99612"
|
||||
width="158.75"
|
||||
height="83.34375"
|
||||
x="-5.0862632e-06"
|
||||
y="213.65623"
|
||||
inkscape:export-filename="/home/amolith/repos/nixnet/assets/posts/privacy.png"
|
||||
inkscape:export-xdpi="96"
|
||||
inkscape:export-ydpi="96" />
|
||||
<g
|
||||
id="g96023"
|
||||
transform="matrix(1.1606952,0,0,1.1606952,39.890636,-37.630023)"
|
||||
style="stroke-width:0.86155266">
|
||||
<path
|
||||
sodipodi:nodetypes="cccccc"
|
||||
inkscape:connector-curvature="0"
|
||||
id="path6909"
|
||||
d="m 34.017854,269.33218 c 14.816666,-8.46667 14.816666,-8.46667 14.816666,-29.63333 -6.35,0 -8.466667,0 -14.816666,-4.23334 m 0,33.86667 c -14.816667,-8.46667 -14.816667,-8.46667 -14.816667,-29.63333 6.350001,0 8.466667,0 14.816667,-4.23334"
|
||||
style="fill:#ffffff;fill-opacity:1;fill-rule:nonzero;stroke:none;stroke-width:0.22795245;stroke-linecap:round;stroke-linejoin:round;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" />
|
||||
<circle
|
||||
r="4.2333336"
|
||||
style="font-style:normal;font-variant:normal;font-weight:normal;font-stretch:normal;font-size:100.21945953px;line-height:125%;font-family:Ubuntu;-inkscape-font-specification:Ubuntu;text-align:center;letter-spacing:0px;word-spacing:0px;text-anchor:middle;display:inline;fill:#ffffff;fill-opacity:1;stroke:#323232;stroke-width:1.8236196;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1"
|
||||
inkscape:export-filename="/home/rhill/permahome/workshop/ublock/platform/chromium/img/browsericons/path2996.png"
|
||||
inkscape:export-xdpi="26.719999"
|
||||
inkscape:export-ydpi="26.719999"
|
||||
cx="37.192852"
|
||||
cy="251.34052"
|
||||
id="path2996-3" />
|
||||
<path
|
||||
sodipodi:nodetypes="ccccccccccc"
|
||||
inkscape:connector-curvature="0"
|
||||
id="path3783"
|
||||
d="m 34.017853,252.39884 c 0,2.91042 -1.322917,4.23334 -4.233334,4.23334 -2.910416,0 -4.233333,-1.32292 -4.233333,-4.23334 v -6.35 h 2.116667 v 6.35 c 0,1.85209 0.264583,2.11667 2.116666,2.11667 1.852083,0 2.116667,-0.26458 2.116667,-2.11667 v -6.35 h 2.116667 z"
|
||||
style="font-style:normal;font-variant:normal;font-weight:normal;font-stretch:normal;font-size:73.20139313px;line-height:125%;font-family:Ubuntu;-inkscape-font-specification:Ubuntu;letter-spacing:0px;word-spacing:0px;fill:#323232;fill-opacity:1;stroke:#ffffff;stroke-width:0;stroke-linecap:square;stroke-linejoin:miter;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1" />
|
||||
</g>
|
||||
</g>
|
||||
</svg>
|
After Width: | Height: | Size: 10 KiB |
File diff suppressed because one or more lines are too long
After Width: | Height: | Size: 35 KiB |
Binary file not shown.
After Width: | Height: | Size: 9.7 KiB |
@ -0,0 +1,50 @@
|
||||
---
|
||||
layout: page
|
||||
title: DNS
|
||||
description: Uncensored public DNS servers running on NixNet
|
||||
subtitle: Uncensored public DNS servers
|
||||
permalink: /dns/
|
||||
cover: /assets/pages/dns.png
|
||||
---
|
||||
***NOTE:*** Adblock with [Pi-Hole](https://pi-hole.net/) is Coming Soon™
|
||||
# Preamble
|
||||
Before going through and setting every device to use my DNS servers, I recommend you read sections 1 - 2 of a [previous post](/blog/dns-and-root-certificates-what-you-need-to-know/#1-what-is-dns-and-why-does-it-concern-you) so you actually understand what's happening and what you're doing. DNS is set up on the same servers as my [Tor exits](/tor-nodes/) so, if you're in a country that actively blocks Tor, you could run into issues unless you use the Anycast IP/hostname.
|
||||
|
||||
# IPs & Hostnames
|
||||
For simplicity's sake, I recommend using the [Anycast](https://en.wikipedia.org/wiki/Anycast) hostname as your primary, the location normally nearest to you as secondary, and a different provider for your tertiary DNS. With Anycast, you'll automatically use the server geographically nearest (the one with the lowest latency) and it will be secured with TLS. For more technical information on Anycast, click the link above. The second Anycast IP address is for plaintext DNS (**not recommended**); everything else is DNS-over-TLS. If you don't know what those are, the next section explains a bit more.
|
||||
|
||||
Anycast
|
||||
* `uncensored.any.dns.nixnet.xyz`
|
||||
* `198.251.90.114:853` **(DoT)**
|
||||
* `198.251.90.114` **(plaintext)**
|
||||
|
||||
Las Vegas
|
||||
* `uncensored.lv1.dns.nixnet.xyz`
|
||||
* `209.141.34.95:853` **(DoT)**
|
||||
|
||||
New York
|
||||
* `uncensored.ny1.dns.nixnet.xyz`
|
||||
* `199.195.251.84:853` **(DoT)**
|
||||
|
||||
Luxembourg
|
||||
* `uncensored.lux1.dns.nixnet.xyz`
|
||||
* `104.244.78.231:853` **(DoT)**
|
||||
|
||||
After setting them, you can test your connection with [ipleak.net](https://ipleak.net). If you have JavaScript enabled, the line below will tell you which server you'll connect to with Anycast at the moment. If you travel a lot, that server will change depending on your location.
|
||||
|
||||
<code id="server">This element requires JavaScript to be enabled</code>
|
||||
|
||||
\* Please note that your DNS-over-TLS client must support [SNI](https://en.wikipedia.org/wiki/Server_Name_Indication) (Server Name Indication).
|
||||
|
||||
# Recommendations
|
||||
I recommend setting fallbacks with other providers (such as [Lelux.fi's](https://lelux.fi/resolver/)) in case mine are down for some reason. Redundancy is always a good thing. A friend of mine has a page with a list of [DNS resolvers](https://wiki.lelux.fi/dns/resolvers/) on it that you can peruse as well. I highly recommend DNS-over-TLS (DoT). Plaintext is . . . well . . . plaintext; anyone can snoop on your traffic. DoT is end-to-end encrypted so no one but you and the DNS server can see your queries. DNS-over-HTTPS (DoH) is just as secure but it's supported by far fewer devices and applications. It's also more difficult to set up 😅
|
||||
|
||||
The best thing to do, in my opinion, is set your DNS at the OS level with [Stubby](https://wiki.archlinux.org/index.php/Stubby) or [Unbound](https://wiki.archlinux.org/index.php/Unbound), for example, and not at the application level i.e. with Firefox's DoH implementation. For more information about configuring custom DNS servers on various devices, read the related [blog post](/blog/setting-dns-on-mobile-and-desktop/).
|
||||
|
||||
Until I get adblocking DNS set up, take a look at my post on blocking ads [locally](/blog/blocking-ads-on-mobile-and-desktop/). There are solutions for most™ devices and none of the guides are *particularly* difficult to implement.
|
||||
|
||||
<script>
|
||||
fetch("https://check.any.dns.nixnet.xyz/check")
|
||||
.then((response) => response.text())
|
||||
.then((server) => document.getElementById("server").innerHTML = server)
|
||||
</script>
|
Loading…
Reference in New Issue