this post was submitted on 05 May 2025
432 points (98.4% liked)

Technology

69771 readers
3835 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] SpaceCadet@feddit.nl 38 points 1 day ago (2 children)

Misleading statement. It doesn't block "traffic", it blocks DNS requests... you don't know how much traffic this corresponds to.

[–] DScratch@sh.itjust.works 3 points 13 hours ago (1 children)

You can easily find out. 2 machines (even virtual machines) one set it's DNS to the PiHole, one not.

Both hit the same sites in the same order. Compare network traffic.

[–] SpaceCadet@feddit.nl 0 points 4 hours ago

That's only for a single case comparison. You can't draw statistically meaningful conclusions about what percentage of traffic the pihole has blocked over a longer period of time.

[–] xavier666@lemm.ee 19 points 1 day ago (2 children)

Correct. The payload of DNS requests is tiny compared to, say requesting a webpage. So there might not be a huge decrease of bandwidth usage reduction. However, having 66.6% less DNS requests is still a win. The router/gateway doesn't have to work that hard because of the dropped requests.

[–] rusticus@lemm.ee -1 points 5 hours ago (1 children)

Of course, because ads have zero bandwidth. /s

Are you an idiot?

[–] xavier666@lemm.ee 3 points 4 hours ago (1 children)

As per the article

on my own network a whopping 66.6% of all traffic is blocked

I stated it's actually 66.6% DNS requests being blocked, not the raw bandwidth utilization. Raw bandwidth savings (by not downloading the non-zero ads) would be much lesser.

Can't we be nicer on the internet?

[–] rusticus@lemm.ee 0 points 2 hours ago (1 children)

No, raw bandwidth savings would likely be very significant. You do realize that for many webpages the ads are most of the bandwidth? On my network (I have capped internet so this is important) if I run dns ad blocking my total bandwidth is 40% less.

[–] sonstwas@sh.itjust.works 1 points 32 minutes ago

I'm not sure whether it makes sense trying to discuss with you but let's try...

You couldn't know how much traffic you saved because you didn't load the ad. The ad could be 1KB, 1MB or 1GB, but because you didn't load it you wouldn't know it's size. Without knowing it's size, you wouldn't be able to calculate the savings.

As mentioned somewhere is in the thread you would have to directly compare two machines visiting the same pages and even then it's probably only approximate because both machines might get served different ads.

[–] SpaceCadet@feddit.nl 24 points 1 day ago (2 children)

It isn't so much about the payload of the DNS requests, but about the content that would have been loaded if the DNS request hadn't been blocked.

If you load a page that has 100kB of useful information, but 1MB of banner ads and trackers ... you've blocked a lot more than 66%. But if you block 1MB of banner ads on a page that hosts a 200MB video, you've blocked a lot less.

Also a 66% blocked percentage seems very high. I have installed pihole on 2 networks, and I'm seeing 1.7% on my own network, but I do run uBlock on almost everything which catches most stuff before it reaches the pihole, and 25% on the other network.

[–] mac@lemm.ee 4 points 1 day ago (1 children)

I run a handful of instances across different networks, 1.7% is suspiciously low, you should make sure you've got the right lists. I like HageZi's

[–] SpaceCadet@feddit.nl 1 points 1 day ago* (last edited 1 day ago) (2 children)

I use firebog's ticked lists, from what I can tell from the logs ad domains are blocked just fine.

But as I said, I have ublock origin on all my browsers which already catches most ads before they reach pihole, and I don't use mobile a lot when I'm at home. Oh, and I also use Linux, so no Microsoft telemetry to block either.

1.7% makes perfect sense to me.

[–] turmacar@lemmy.world 2 points 22 hours ago* (last edited 22 hours ago)

I was averaging ~1-2% blocked using the firebog and a few other lists, I also have ublock origin on everything I can. Added hagezi's 'pro plus' list last month and it's up to 39% blocked.

[–] mac@lemm.ee 1 points 20 hours ago* (last edited 20 hours ago) (1 children)

Yeah no ublock origin really won't block all that many, the chattiest DNS comes from apps and smart devices, windows and mac laptops etc.

I also run ublock on all of my browsers

[–] SpaceCadet@feddit.nl 1 points 20 hours ago

Yeah no ublock origin really won’t block all that many

Meh, it's fairly easy to check this you know. If I turn off uBlock, my pihole logs do turn red. If it's left on, pihole logs stay mostly green, with nothing suspicious or out of the ordinary getting through.

the chattiest DNS comes from apps and smart devices, windows and mac laptops etc.

I don't have many of those. My work laptop is windows but it connects through a VPN only, and I have my smartphone that I barely use at home.

[–] mic_check_one_two@lemmy.dbzer0.com 1 points 22 hours ago* (last edited 22 hours ago) (1 children)

From my understanding, uBlock doesn’t have any impact on a pihole. Any browser-based ad blocker will work by detecting the ads after the DNS requests have been made. A properly functioning pihole would intercept the ads before the ad blocker. 1.7% seems suspiciously low; My primary pihole averages anywhere from 25-50%, depending on usage.

[–] SpaceCadet@feddit.nl 7 points 22 hours ago

Your understanding is not correct. For page elements, uBlock prevents the domain from even trying to load, so no DNS request is ever made. Only if you go directly to an ad domain from the url bar (who does that?), does a DNS request get made.

For example, on my own webserver, I created a simple static html file with an tag pointing to an ad domain that I know is blocked on uBlock as well as on the pihole. Like so:

<html>
adblock test
<img src="https://track.adtrue.com/some/bannerad.png"></img>
</html>

Loading that page, uBlock showed 1 blocked ad on that page, pihole only logged a DNS request to my webserver, not to track.adtrue.com.

Once I turned off uBlock in the browser and reloaded the page, pihole did log the request to track.adtrue.com and blocked it. My browser showed a broken image.