Having not used one of these (and being extremely leery to put one on my network), does using a pi-hole with a custom blocklist for these things help? I’ve considered getting one and isolating it in its own subnet, but I only know enough to be dangerous.








Hey, your epidermis is showing!