- Joined
- Aug 16, 2005
- Messages
- 27,624 (3.84/day)
- Location
- Alabama
System Name | RogueOne |
---|---|
Processor | Xeon W9-3495x |
Motherboard | ASUS w790E Sage SE |
Cooling | SilverStone XE360-4677 |
Memory | 128gb Gskill Zeta R5 DDR5 RDIMMs |
Video Card(s) | MSI SUPRIM Liquid 5090 |
Storage | 1x 2TB WD SN850X | 2x 8TB GAMMIX S70 |
Display(s) | 49" Philips Evnia OLED (49M2C8900) |
Case | Thermaltake Core P3 Pro Snow |
Audio Device(s) | Moondrop S8's on Schitt Gunnr |
Power Supply | Seasonic Prime TX-1600 |
Mouse | Razer Viper mini signature edition (mercury white) |
Keyboard | Wooting 80 HE White, Gateron Jades |
VR HMD | Quest 3 |
Software | Windows 11 Pro Workstation |
Benchmark Scores | I dont have time for that. |
Hey everyone! I am running a usability experiment to see how naive it might be to provide everyday users the ability to browse the internet in a safer manner.
To accomplish this I am running a public DNS server that is running Pi-Hole with extended definitions.
This experiment ties in directly with the guide im currently writing here:
https://www.techpowerup.com/forums/threads/guide-global-network-dns-blacklisting-pi-hole.233545/
To do this, I am hosting a small virtual server on Digital Ocean. I am using my own funds to give it a shot.
The Pi-Hole software is free and currently we are here with functionality.
I run some extra definition lists on the PI which caches and remembers its DNS requests, whenever the PI doesnt know something I take this a step further and the forward addresses point to OpenDNS family safe servers. Which according to openDNS block the following:
The goal of this is simple.
To accomplish this I am running a public DNS server that is running Pi-Hole with extended definitions.
This experiment ties in directly with the guide im currently writing here:
https://www.techpowerup.com/forums/threads/guide-global-network-dns-blacklisting-pi-hole.233545/
To do this, I am hosting a small virtual server on Digital Ocean. I am using my own funds to give it a shot.
The Pi-Hole software is free and currently we are here with functionality.

I run some extra definition lists on the PI which caches and remembers its DNS requests, whenever the PI doesnt know something I take this a step further and the forward addresses point to OpenDNS family safe servers. Which according to openDNS block the following:
What does FamilyShield Block?
The service blocks pornographic content, including our “Pornography,” “Tasteless,” and “Sexuality” categories, in addition to proxies and anonymizers (which can render filtering useless). It also blocks phishing and some malware.
The goal of this is simple.
- Can I or another organization or entity use free products to provide a safer internet to users without charging them a ludicrous amount of money?
- How effective is it?
- Can it be done at a low or no cost?
- Response time ok
- false positives
- does this inhibit your browsing habits within reason?
- Telemetry
- malware domains
- ad domains
- pornographic and other none PG domains
45.55.35.57
(I currently only route IPV4)
I DO NOT keep any private or identifying information.(I currently only route IPV4)
Last edited: