![]() So this post isn’t a guide but rather some suggestions for setting it up securely if it is something you are planning on doing at your own risk. If you actually read this far in the foreword, there are several security risks with making your Pi-hole publicly available, so it’s not something we are ready to instruct you to do. But that doesn’t mean something can’t go wrong. Driving around a four-wheel box carrying flammable materials at 97km/h doesn’t exactly sound safe when phrased that way, yet we do it anyway because most of the time, everything works as it was meant to. Even with all of the risks (perceived or unperceived), it is still worth it for many. So if there are so many potential problems, why use software at all? Mostly because it helps us accomplish something or add value to our life. You also have the reputation of the company to make you feel more comfortable with using the software (but that’s not completely trustworthy either). In addition, if the software does what you want it to, there’s not much reason to think it’s doing something bad. This is mainly because people work hard to squash these problems and some have not even been discovered yet. However, you probably don’t think of all the components that make up that software or how many vulnerabilities you are opening yourself up to. When you see software like macOS, you may want to use it because of all the cool features. Throw in malware, software specifically designed to take advantage of exploits, and you’re in for a big mess. You now have a piece of software that has an infinitesimal number of flaws or security holes.Īnd that’s just software meant to be legitimate and serve a useful purpose. If you combine all of those into a new piece of software, you are bringing along all that luggage on top of your own software’s issues. Take macOS for example: it’s built using many other people’s software (both open and closed source).Įach of those pieces of software has their own version, their own development team, their own bugs, and their own vulnerabilities. There are discovered and undiscovered security problems with both. Software and hardware are inherently flawed because they are created by humans. It’s not enough to live off, but it gives some some incentive to keep trying. Those donations have also allowed us to grow from a team of one, to a team of five. And because each member of the Pi-hole dev team has a full-time job we just work on this project in our free time, so it’s your donations that keep us motivated. It’s been challenging to keep up because the project is growing larger then any of us ever imagined. We don’t have a guide on this process for several reasons, which you will read about below. It is possible to use your Pi-hole remotely for ad-blocking on-the-go.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |