• baggachipz@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    5
    ·
    edit-2
    22 hours ago

    Having not used one of these (and being extremely leery of putting one on my network), does using a pi-hole with a custom blocklist for these things help? I’ve considered getting one and isolating it in its own subnet, but I only know enough to be dangerous.