I was just looking around on different websites for what happened to programs like PeerBlock
Seems like they’re not really too helpful to protect yourself against snitches. But they are helpful for blocking the IP-ranges of advertising companies…
Or use a PiHole, which would work out better than peer block.
Shoutout the PiHole team!
Or, if you’re disinclined to running a Pi-hole yourself, there are services like NextDNS.
Seconded on NextDNS. It’s like $20/year for the “pro” version (no monthly limits) and I honestly cannot recall the last time I saw an ad on any device I control. The sole exception is my Apple TV, where one of the apps I use has ads injected into the video, so, no way to block those.
If advertisers truly cared about serving the customers they claim to care so much about, the ad networks would have better standards and more safeguards to prevent malware. I’d still block them, I just wouldn’t feel the same level of pride in blocking them for both annoyance and safety factors.
I’d be a good start, if content platforms had to apply the same guidelines to ads, as they do to content. It’s kinda telling that people on the platform need to not swear, while the ad below goes “You can’t last 5 seconds in this NFT gambling waifu gatcha collector aimed at teens.” or just offer money freud scams directly.
Yeah. No ads on my regular stuff. My PS4, which I stream with, still gets ads.
Things like PiHole, nextDNS and the desktop versions of adguard only block HTTP, FTP and POP and SMTP connections. It doesn’t block connections to advertising companies through other protocols.
Correct, but what other protocols are they using? When was the last time you had an ad served via FTP?
good point. but there’s still malware C&C servers that can only be blocked by blocking the IP range
Yeah these have basically been ineffective for P2P such as torrenting for many years. The media companies can just outsource their Anti-Sharing campaigns to third parties and it is fairly trivial for them to do discovery from non-obvious or even residential IPs. They just have to open a given torrent long enough to see who is in swarm and start sending nastygrams to those ISPs.
The best way to protect yourself is seedbox/VPS in a jurisdiction with no filesharing enforcement, or at a minimum join a reputable private tracker, because then all participants are vetted and there will never be a snitch in swarm.