It had been a busy few days at my end.
VALORANT greeted with a pleasant surprise tonight though. There’s a new map! Breeze! I have no clue how old this is, but I am definitely enjoy the new view.
Look at this.
So I decided to download my Facebook data after learning I was a part of the 533m breach.— Zamaan Qureshi (@zamaan_qureshi) April 11, 2021
Clicked on a folder called “your_off_facebook_activity” and was unsurprised to learn that Facebook is following me all over the internet. pic.twitter.com/MSkceFAqYg
Facebook tracks your web presence and activities even outside of their “Facebook.com” domain. Facebook is not a social networking website anymore. They are a data mining corporation, focused on showing targeted ads. They are minting money based on your interests.
That Twitter thread has examples of the level of data that Facebook can collect. They can be so precise that they will know of the time you ordered pizza, what page of a website you are at, what kind of action you are taking on that website, what college you are applying to, and everything in between!
Facebook must be deleted. Today.
At the least, you must be turning off their “Off-Facebook activity” settings. Get a copy of your data before you turn that off.
I have been a fan of NextDNS for the last year or so. It’s easy to use, is cheap, and makes it incredibly easy to manage my ad-block lists. The configuration functionality of NextDNS is great as well, as it allows for compartmentalized setup.
However, I have always wanted to start using Pi-hole as it offers more data control (self-hosted) and because it’s open source. While Pi-hole setup is straightforward and can act as a network-wide ad-blocker within your house, extending that to mobile/other networks, for on-the-go usage is not easy. Pi-hole docs have this guide about setting up that extension, using OpenVPN protocol but I hear Wireguard has superior performance.
I tried Rajan’s guide involving Wireguard, and later came Tailscale which makes VPNs stupidly easy.
Tailscale is built on the top of the Wireguard protocol as well.
Once you have installed and logged into your Tailscale account on your devices, they will basically be available on a flat network, thus allowing your devices to talk to each other. Talk in this context refers to setting up a service/server on one device, making it listen on the Tailscale network and making the other devices connect to it.
For the purpose of this post, I will explain how I set up my Pi-hole to listen on the Tailscale network, allowing for network-wide ad blocking.
Get Tailscale on your devices and log with a Google or Microsoft account
- Tailscale is available for download on Android, iOS, Windows, Mac and Linux. You can get your copy here.
- Once you have installed it, log into each device using your Google or Microsoft account.
- Do so on the Linux device that you are about to use for your Pi-hole as well. If you have a Windows device, you can install Linux on it using Windows Subsystem for Linux.
- Once that’s completed, you can find your devices on this Tailscale admin page.
Set up Pi-hole on a Linux device
It’s time to install Pi-hole on your Raspberry Pi or the Linux device.
Work through the Pi-hole setup guide here. The basic installer at the top of the page can work.
While setting that up, you will be prompted to choose a “listening interface”. Choose “tailscale0”, not “eth0”.
Once the set up is done, you can visit
Settings > DNStab of your Pi-hole settings to verify that
Listen only on interface tailscale0is selected under
Interface listening behavior.
At this stage, Pi-hole set up is all done!
Marking Pi-hole as DNS resolver for all Tailscale devices
Log into your Tailscale admin dashboard. Under the
Name serverssection, enter the Tailscale node address for the device you installed Pi-hole on.
Make sure that you do not enable magic DNS. I am fuzzy on what it’s supposed to do, but I have noticed that non-Tailscale traffic doesn’t work when magic DNS is enabled. It’s probably being discussed on this GitHub issue.
In my case, I have two Pi-holes. One on my Raspberry Pi at home, and one on the Google Cloud. As such, the two addresses that I entered on my Tailscale name servers section are 100.112.92.63 and 100.127.221.120.
Once your name servers are added, enable Tailscale on your computer/mobile devices. By doing so, your VPN configuration will be enabled, and all DNS queries will be tunneled to your Pi-hole. This will work even when you are on a mobile network, outside of your house!
Disable private DNS on Android
If you have a private DNS address added on your Android settings, turn it off.
Things to note
One of the things that Tailscale promises is that the Tailscale node address never changes for your device. This ensures that the name servers that you just entered always work, thus not leaving you without a DNS resolver.
Are apps/websites not loading?
It’s possible that you enabled Tailscale on your computer/mobile before adding the Pi-hole’s node address on Tailscale DNS page. In such a case, restart Tailscale on your device and it must fetch the name servers from your admin.
Do not enable
Block connections without a VPNsetting on your Android VPN settings. Brad explains why here.
You can share your Tailscale node where Pi-hole is running (your Raspberry Pi device or the Linux device) with other Tailscale users. Once they accept the invite, they can add your Tailscale node address as the name server on their DNS page. By doing so, they will get the benefit of your Pi-hole as well.
This is not an open resolver. This Pi-hole DNS resolver will be accessible only by Tailscale nodes on your Tailscale network, and by those that you invite to that device.
Without doubt, I truly enjoy and recommend using privacy-respecting products.
In a recent conference, Tim Cook committed to advancing user privacy by giving them tools to control where their data is shared. Especially in today’s world, it’s important to understand the implications of online data tracking, and it’s necessary to be informed about ways to prevent that. Apple’s recent release of an illustration explaining implications of data tracking will be a great read. While the conclusion of that report focusses on Apple-centric tools to prevent data tracking, the content of the report holds true, that companies profit by monitoring users.
At Apple, we made our choice a long time ago. We believe that ethical technology is technology that works for you. It’s technology that helps you sleep, not keeps you up. It tells you when you’ve had enough, it gives you space to create, or draw, or write or learn, not refresh just one more time. It’s technology that can fade into the background when you’re on a hike or going for a swim but is there to warn you when your heart rate spikes or help you when you’ve had a nasty fall. And with all of this, always, it’s privacy and security first, because no-one needs to trade away the rights of their users to deliver a great product.Tim Cook at the Computers, Privacy and Data Protection conference, MacRumors
Starting with the next beta release of iOS 14, Apple will be launching a new tool called
App Tracking Transparencythat will enable users of apps to control sharing of data with app makers. By taking away data tracking functionality within the iOS ecosystem, Apple is definitely making a sizeable dent in businesses that primarily focus on monetizing user data, read Facebook.
Open-source software like Pi-hole has existed for a while, and recently, online services like NextDNS and AdGuard have emerged that offer similar controls. I am a happy user of these products and services, but I particularly like how Apple is championing this effort.
iOS takes up 50% of the market share in the US, which is Facebook’s largest market. If Facebook is feeling threatened by Apple iOS 14’s new privacy features, we are moving in the right direction.
It’s also worth noting that WhatsApp will be sharing user data with Facebook group of companies. It’s particularly worse for those WhatsApp Business API users as their messages wouldn’t be end-to-end encrypted. Differently put, they will be visible to third-party Business Solutions Providers, including cloud-based version of the API hosted by Facebook:
Some organizations may choose to delegate management of their WhatsApp Business API endpoint to a third-party Business Solution Provider. In these instances, communication still uses the same Signal protocol encryption. However, because the WhatsApp Business API user has chosen a third party to manage their endpoint, WhatsApp does not consider these messages end-to-end encrypted. In the future, in 2021, this will also apply to businesses that choose to leverage the cloud-based version of the API hosted by Facebook.Gizmodo – This Was WhatsApp’s Plan All Along
On the flip side, Apple is fighting back, highlighting that this will impact small businesses that depend on personalized ads for sales. Facebook also highlights that Apple’s own apps will be exempted from App Tracking Transparency, but it’s not clear if that’s true, based on Apple’s press release.
Other privacy efforts by Apple that I appreciate
In iOS 14 and iPad OS 14, Apple also launched a new App Store functionality, called the privacy nutrition labels. It gives users a quick overview of the apps’ privacy practices — as in, what level of data is obtained by the app, what these details are used for, and also outlines how they may be linked to an individual. Apple’s own apps, like Apple Music, are required to show these labels; they are not exempted.
If you are not aware, the messaging app Signal collects only your mobile number. It doesn’t link that mobile number to your identity either! If you are a WhatsApp or Telegram user, it’s time to consider switching to Signal.
I am keen on seeing where things head from here!
Hey there! I am a Happiness Engineer at Automattic, working on WordPress.com support. If you enjoy discussing online privacy, encryption, and fediverse like I do, you can reach me by commenting on my posts, or by email.