Having not used one of these (and being extremely leery to put one on my network), does using a pi-hole with a custom blocklist for these things help? I’ve
considered getting one and isolating it in its own subnet, but I only know enough to be dangerous.
Having not used one of these (and being extremely leery to put one on my network), does using a pi-hole with a custom blocklist for these things help? I’ve considered getting one and isolating it in its own subnet, but I only know enough to be dangerous.