bluepanther69 wrote:My two cents on the adds topic:
You have some decent suggestions here. Would it surprise you to know that I do all of these things, and more? (actually, quite a bit more).
For instance, I do run a complete pihole instance on an RPI that all devices on my network access to get their DNS, and I actively block DoH and DoT connections at my gateways so that any software that tries to get around my DNS is forced to use it.
I maintain two full-time VPN gateways hosted on small single board computers; one on my main LAN (where my browsing occurs) and one on my IOT VLAN (where all IOT devices are sequestered and isolated). The IOT VLAN has no access to the internet at all except through the VPN gateway; all IOT devices have no choice but to go through a VPN. The IOT devices use the pihole which has a carefully firewalled presence on the IOT VLAN; only port 53 is exposed.
The pihole access the internet via the VPN gateway on the main LAN.
I employ a zero trust architecture throughout my network, and a private vlan between my workstation and my NAS since there is a great deal of communication between the two and in the event of a breach I want that communication protected.
I employ a multi-tier browsing architecture, tied to different virtual machines. My main system (Level 3) browses through TOR and Privoxy and is routed through the VPN gateway. The browsers are chromium or firefox, both with multiple privacy plugins (noscript, privacy badger, others). The next level down (Level 2) in browsing is in a VM (I am using it now), is firefox only, with multiple privacy plugins, and goes through the VPN gateway. This VM contains none of my personal information and no email...just the firefox browser.
The next level down (Level 1) is a VM that contains firefox with modest privacy protection and a nearly stock chromium, directed through the VPN gateway. The lowest level (Level 0) is a modestly protected firefox and full-stock chromium, routed out my main gateway and used for banks and brokerages where I have to allow geolocation.
I do not browse except in my main Level 3 system (TOR, privoxy, VPN). All lower-level systems are used only for particular sites, with the level of protection dependent upon the needs of the particular site and the degree of trust I am willing to extend to that site. For instance, I do ecommerce mostly at Level 1, but some at Level 0. Notably, I access Facebook and Linkedin via Level 3.
I understand your feeling, but we can't do much given that every site we connect to tries to gather data from us, and everything is web based.
You can do quite a lot. I have described some of it here. I didn't even talk about my phone, which is also fully secure - and that was not trivial to accomplish, I assure you.
The problem, of course, is that I design network infrastructure for a living. So I have the necessary knowledge. The vast majority of people do not have that knowledge, and that is a very serious and still growing problem.
The USA is becoming malignant in many ways, and there are essentially no privacy laws. The digital environment is going from chaotic wild-west to perhaps actively dangerous. For instance, in current events, there is this:
https://www.zdnet.com/article/period-tr ... lete-them/Now, I personally have no need to track a period but I know a lot of people who might have that need. I think the point is pretty clear.
So, I am not tracked around the internet except when I very explicitly choose to allow it. For now. But I wonder if AI will ultimately render all my safeguards moot. But, I won't worry about that until next week...