I was just looking around on different websites for what happened to programs like PeerBlock

Seems like they’re not really too helpful to protect yourself against snitches. But they are helpful for blocking the IP-ranges of advertising companies…

  • AtariDump@lemmy.world
    link
    fedilink
    arrow-up
    33
    arrow-down
    1
    ·
    9 days ago

    Or use a PiHole, which would work out better than peer block.

    Shoutout the PiHole team!

      • plz1@lemmy.world
        link
        fedilink
        English
        arrow-up
        13
        ·
        8 days ago

        Seconded on NextDNS. It’s like $20/year for the “pro” version (no monthly limits) and I honestly cannot recall the last time I saw an ad on any device I control. The sole exception is my Apple TV, where one of the apps I use has ads injected into the video, so, no way to block those.

        If advertisers truly cared about serving the customers they claim to care so much about, the ad networks would have better standards and more safeguards to prevent malware. I’d still block them, I just wouldn’t feel the same level of pride in blocking them for both annoyance and safety factors.

        • Nicro@discuss.tchncs.de
          link
          fedilink
          arrow-up
          5
          ·
          8 days ago

          I’d be a good start, if content platforms had to apply the same guidelines to ads, as they do to content. It’s kinda telling that people on the platform need to not swear, while the ad below goes “You can’t last 5 seconds in this NFT gambling waifu gatcha collector aimed at teens.” or just offer money freud scams directly.

    • Mr. Zeus@feddit.orgOP
      link
      fedilink
      English
      arrow-up
      1
      ·
      8 days ago

      Things like PiHole, nextDNS and the desktop versions of adguard only block HTTP, FTP and POP and SMTP connections. It doesn’t block connections to advertising companies through other protocols.

      • AtariDump@lemmy.world
        link
        fedilink
        arrow-up
        1
        ·
        7 days ago

        Correct, but what other protocols are they using? When was the last time you had an ad served via FTP?

        • Mr. Zeus@feddit.orgOP
          link
          fedilink
          English
          arrow-up
          1
          ·
          7 days ago

          good point. but there’s still malware C&C servers that can only be blocked by blocking the IP range

  • mctoasterson@reddthat.com
    link
    fedilink
    arrow-up
    4
    ·
    8 days ago

    Yeah these have basically been ineffective for P2P such as torrenting for many years. The media companies can just outsource their Anti-Sharing campaigns to third parties and it is fairly trivial for them to do discovery from non-obvious or even residential IPs. They just have to open a given torrent long enough to see who is in swarm and start sending nastygrams to those ISPs.

    The best way to protect yourself is seedbox/VPS in a jurisdiction with no filesharing enforcement, or at a minimum join a reputable private tracker, because then all participants are vetted and there will never be a snitch in swarm.

      • mctoasterson@reddthat.com
        link
        fedilink
        arrow-up
        2
        ·
        7 days ago

        If you have your VPN client and torrent application set up correctly, your traffic would all be routed through the VPN and the network would see your VPN IP and not the actual IP of your machine. If you have a private tracker you can probably test this on their site as many will show you which IP they see as you seed.

        A few considerations with this- Some VPN services do not support or allow torrenting. Also some trackers have issues with you using multiple IPs etc. so your account could be flagged if you have used different VPN nodes over time.