• Replication mode on VALORANT

    The new replication mode on VALORANT is, well, LOL. It starts with 5 players choosing an agent each, and there is a random selector that goes through the list of agents and one is chosen. In our case, it was Raze and the opponents were a Raze bunch too.

    I don’t think I like this mode just yet, but I guess I must give it some time.

    I cannot imagine how the gameplay would be like when everyone has players with the blind skill. VALORANT social media team give us a sample. Real play must be the same, only 100x worse.

  • Breeze

    It had been a busy few days at my end.

    VALORANT greeted with a pleasant surprise tonight though. There’s a new map! Breeze! I have no clue how old this is, but I am definitely enjoy the new view.

    Picture of a gameplay from VALORANT.
    Picture of a gameplay from VALORANT.
    Picture of a gameplay from VALORANT.
    Picture of a gameplay from VALORANT.
    Picture of a gameplay from VALORANT.
    Picture of a gameplay from VALORANT.
    Picture of a gameplay from VALORANT.
  • Facebook must be deleted

    Look at this.

    Facebook tracks your web presence and activities even outside of their “Facebook.com” domain. Facebook is not a social networking website anymore. They are a data mining corporation, focused on showing targeted ads. They are minting money based on your interests.

    That Twitter thread has examples of the level of data that Facebook can collect. They can be so precise that they will know of the time you ordered pizza, what page of a website you are at, what kind of action you are taking on that website, what college you are applying to, and everything in between!

    Facebook must be deleted. Today.

    At the least, you must be turning off their “Off-Facebook activity” settings. Get a copy of your data before you turn that off.

  • Breach alerts throughout your domain

    I am a fan of Have I Been Pwned. So far I have been using the service by periodically checking for my email addresses, or by depending on 1Password’s integration of that service. A much better solution would be to have Have I Been Pwned inform me of breaches that happen throughout my custom domains. Turns out that feature is available!

    I have enrolled all of my domains with this new feature. It’s also neat that Have I Been Pwned needs to verify my ownership of the domain only once. I don’t have to leave the DNS records in place for future alerts.

    You can sign up for alerts here — Have I Been Pwned Domain Search.

  • Penta in escalation

    We had a better gun, yes, but I will take that penta.

  • Setting up Pi-hole on the Tailscale network

    I have been a fan of NextDNS for the last year or so. It’s easy to use, is cheap, and makes it incredibly easy to manage my ad-block lists. The configuration functionality of NextDNS is great as well, as it allows for compartmentalized setup.

    However, I have always wanted to start using Pi-hole as it offers more data control (self-hosted) and because it’s open source. While Pi-hole setup is straightforward and can act as a network-wide ad-blocker within your house, extending that to mobile/other networks, for on-the-go usage is not easy. Pi-hole docs have this guide about setting up that extension, using OpenVPN protocol but I hear Wireguard has superior performance.

    I tried Rajan’s guide involving Wireguard, and later came Tailscale which makes VPNs stupidly easy.

    Tailscale is built on the top of the Wireguard protocol as well.

    Once you have installed and logged into your Tailscale account on your devices, they will basically be available on a flat network, thus allowing your devices to talk to each other. Talk in this context refers to setting up a service/server on one device, making it listen on the Tailscale network and making the other devices connect to it.

    For the purpose of this post, I will explain how I set up my Pi-hole to listen on the Tailscale network, allowing for network-wide ad blocking.

    Get Tailscale on your devices and log with a Google or Microsoft account

    • Tailscale is available for download on Android, iOS, Windows, Mac and Linux. You can get your copy here.
    • Once you have installed it, log into each device using your Google or Microsoft account.
    • Do so on the Linux device that you are about to use for your Pi-hole as well. If you have a Windows device, you can install Linux on it using Windows Subsystem for Linux.
    • Once that’s completed, you can find your devices on this Tailscale admin page.

    Set up Pi-hole on a Linux device

    It’s time to install Pi-hole on your Raspberry Pi or the Linux device.

    Work through the Pi-hole setup guide here. The basic installer at the top of the page can work.


    While setting that up, you will be prompted to choose a “listening interface”. Choose “tailscale0”, not “eth0”.

    Once the set up is done, you can visit Settings > DNS tab of your Pi-hole settings to verify that Listen only on interface tailscale0 is selected under Interface listening behavior.

    Image to indicate the "Interface Listening Behavior" setting on Pi-hole
    Indicates the “Interface Listening Behavior” setting on my Pi-hole

    At this stage, Pi-hole set up is all done!

    Marking Pi-hole as DNS resolver for all Tailscale devices

    Log into your Tailscale admin dashboard. Under the Name servers section, enter the Tailscale node address for the device you installed Pi-hole on.

    Magic DNS

    Make sure that you do not enable magic DNS. I am fuzzy on what it’s supposed to do, but I have noticed that non-Tailscale traffic doesn’t work when magic DNS is enabled. It’s probably being discussed on this GitHub issue.

    In my case, I have two Pi-holes. One on my Raspberry Pi at home, and one on the Google Cloud. As such, the two addresses that I entered on my Tailscale name servers section are and

    An image to indicate the DNS name servers settings on the Tailscale website
    Name servers entered on my Tailscale account

    Once your name servers are added, enable Tailscale on your computer/mobile devices. By doing so, your VPN configuration will be enabled, and all DNS queries will be tunneled to your Pi-hole. This will work even when you are on a mobile network, outside of your house!

    Disable private DNS on Android

    If you have a private DNS address added on your Android settings, turn it off.

    Things to note

    One of the things that Tailscale promises is that the Tailscale node address never changes for your device. This ensures that the name servers that you just entered always work, thus not leaving you without a DNS resolver.

    Are apps/websites not loading?

    It’s possible that you enabled Tailscale on your computer/mobile before adding the Pi-hole’s node address on Tailscale DNS page. In such a case, restart Tailscale on your device and it must fetch the name servers from your admin.

    Do not enable Block connections without a VPN setting on your Android VPN settings. Brad explains why here.

    You can share your Tailscale node where Pi-hole is running (your Raspberry Pi device or the Linux device) with other Tailscale users. Once they accept the invite, they can add your Tailscale node address as the name server on their DNS page. By doing so, they will get the benefit of your Pi-hole as well.

    This is not an open resolver. This Pi-hole DNS resolver will be accessible only by Tailscale nodes on your Tailscale network, and by those that you invite to that device.

    Whoogle on Tailscale

    Access ad-free, tracker-free Google search results.

    Hydroxide on Tailscale

    Access your ProtonMail emails on a self-hosted, open-source bridge called Hydroxide.

    libreddit on Tailscale

    Self-host a private, ad and tracker-free reddit frontend UI with libreddit.

  • Airship! 🚁

    The hype is real! The map will be available for free on all platforms.

  • Among Us wrangler

    At Automattic, we are able to pick our own job titles. After hosting a few rounds of Among Us within my team yesterday, I am officially our in-house Among Us wrangler!

  • Kudos to Apple for privacy-focussed features

    I have been using ProtonMail, Signal, DuckDuckGo and SimpleLogin for a fairly long time. These make up an integral part of my online presence, and I cannot go back to a time where these didn’t exist.

    Without doubt, I truly enjoy and recommend using privacy-respecting products.

    In a recent conference, Tim Cook committed to advancing user privacy by giving them tools to control where their data is shared. Especially in today’s world, it’s important to understand the implications of online data tracking, and it’s necessary to be informed about ways to prevent that. Apple’s recent release of an illustration explaining implications of data tracking will be a great read. While the conclusion of that report focusses on Apple-centric tools to prevent data tracking, the content of the report holds true, that companies profit by monitoring users.

    At Apple, we made our choice a long time ago. We believe that ethical technology is technology that works for you. It’s technology that helps you sleep, not keeps you up. It tells you when you’ve had enough, it gives you space to create, or draw, or write or learn, not refresh just one more time. It’s technology that can fade into the background when you’re on a hike or going for a swim but is there to warn you when your heart rate spikes or help you when you’ve had a nasty fall. And with all of this, always, it’s privacy and security first, because no-one needs to trade away the rights of their users to deliver a great product.

    Tim Cook at the Computers, Privacy and Data Protection conference, MacRumors

    Starting with the next beta release of iOS 14, Apple will be launching a new tool called App Tracking Transparency that will enable users of apps to control sharing of data with app makers. By taking away data tracking functionality within the iOS ecosystem, Apple is definitely making a sizeable dent in businesses that primarily focus on monetizing user data, read Facebook.

    An image showing Apple's new App Tracking Transparency feature
    Apple’s new App Tracking Transparency feature that will be available in the next beta release of iOS 14

    Open-source software like Pi-hole has existed for a while, and recently, online services like NextDNS and AdGuard have emerged that offer similar controls. I am a happy user of these products and services, but I particularly like how Apple is championing this effort.

    iOS takes up 50% of the market share in the US, which is Facebook’s largest market. If Facebook is feeling threatened by Apple iOS 14’s new privacy features, we are moving in the right direction.

    It’s also worth noting that WhatsApp will be sharing user data with Facebook group of companies. It’s particularly worse for those WhatsApp Business API users as their messages wouldn’t be end-to-end encrypted. Differently put, they will be visible to third-party Business Solutions Providers, including cloud-based version of the API hosted by Facebook:

    Some organizations may choose to delegate management of their WhatsApp Business API endpoint to a third-party Business Solution Provider. In these instances, communication still uses the same Signal protocol encryption. However, because the WhatsApp Business API user has chosen a third party to manage their endpoint, WhatsApp does not consider these messages end-to-end encrypted. In the future, in 2021, this will also apply to businesses that choose to leverage the cloud-based version of the API hosted by Facebook.

    Gizmodo – This Was WhatsApp’s Plan All Along

    On the flip side, Apple is fighting back, highlighting that this will impact small businesses that depend on personalized ads for sales. Facebook also highlights that Apple’s own apps will be exempted from App Tracking Transparency, but it’s not clear if that’s true, based on Apple’s press release.

    Other privacy efforts by Apple that I appreciate

    In June of 2020, Apple announced support for native encrypted DNS throughout the device. This is a big deal for users like me that have a NextDNS subscription.

    In iOS 14 and iPad OS 14, Apple also launched a new App Store functionality, called the privacy nutrition labels. It gives users a quick overview of the apps’ privacy practices — as in, what level of data is obtained by the app, what these details are used for, and also outlines how they may be linked to an individual. Apple’s own apps, like Apple Music, are required to show these labels; they are not exempted.

    An image showing the new privacy nutrition labels feature on the Apple App Store
    An image showing the new privacy nutrition labels feature on the Apple App Store

    If you are not aware, the messaging app Signal collects only your mobile number. It doesn’t link that mobile number to your identity either! If you are a WhatsApp or Telegram user, it’s time to consider switching to Signal.

    An image highlighting the data that the messaging app Signal may collect and link to your identity
    Signal’s privacy nutrition labels on the App Store

    I am keen on seeing where things head from here!

  • Ejected into space

    Okay, this is me. 😅

Hey there! I am a Happiness Engineer at Automattic, working on WordPress.com support. If you enjoy discussing online privacy, encryption, and fediverse like I do, you can reach me by commenting on my posts, or by email.