• finitebanjo@piefed.worldOP
    link
    fedilink
    English
    arrow-up
    4
    arrow-down
    1
    ·
    2 days ago

    Thats weird because I run it with uBlock Origin and the only time I’ve ever seen an ad was after a site updated and uBlock had yet to adapt to it yet.

      • finitebanjo@piefed.worldOP
        link
        fedilink
        English
        arrow-up
        2
        ·
        edit-2
        2 days ago

        I’m not going to accuse them of user error but I’m having trouble imagining how a browser without a tunneling engine could bypass that.

        It would need a false endpoint before the user and the send all the otherwise blocked traffic through on a single channel and at that point everything is completely compromised.

        • ulterno@programming.dev
          link
          fedilink
          English
          arrow-up
          2
          arrow-down
          1
          ·
          edit-2
          1 day ago

          It could just have enabled DNS over HTTPS in the settings, hence not having used the user set up DNS at all.
          Except for getting the IP of the DNS that they then connected via HTTPS.
          Librewolf uses Quad9 by default IIRC.

        • Cort@lemmy.world
          link
          fedilink
          arrow-up
          2
          ·
          edit-2
          2 days ago

          Honestly, it may have nothing to do with the browser.

          For instance at&t’s newest fiber gateway (bgw320-500/505, 3-4 years old at this point) has a known issue that bypasses pihole for all Wi-Fi devices. Such that only hardwired devices can utilize its DNS services. Even with the pihole acting as DHCP server