• BlameTheAntifa@lemmy.world
    link
    fedilink
    arrow-up
    10
    ·
    14 hours ago

    They still work together. Pi-hole is an excellent second line of defense, but an active firewall tells you about what is trying to make connections and asks for your consent. Block lists are great, but they aren’t impenetrable. If you want to know exactly what your device and software are doing, you should also be using an active firewall.