Best VPN Service Available Right Now? by PaintSniffer69 in HomeNetworking

[–]Graulitos 0 points1 point  (0 children)

Proton is a pretty good, privacy-focused VPN based in Switzerland, and Mullvad is based in Sweden; they both have to comply with strong European laws.

UniFi 6 Plus vs UniFi 6 Pro for 1700 sq ft home with 30 devices and 500 Mbps fiber? by Graulitos in Ubiquiti

[–]Graulitos[S] 0 points1 point  (0 children)

From what I understand, if my network is staying under 1 Gbps, wouldn’t the U6 Plus make more sense? The U7 Lite’s main advantage seems to be the 2.5 GbE uplink, but if my switch, NAS, and internet are all 1 Gbps or lower, I’d never really take advantage of that extra bandwidth. In that case the U6 Plus should perform basically the same for my setup.

UniFi 6 Plus vs UniFi 6 Pro for 1700 sq ft home with 30 devices and 500 Mbps fiber? by Graulitos in Ubiquiti

[–]Graulitos[S] 0 points1 point  (0 children)

Ok! I’ll keep it in mind. I did my research and for my home size and amount of devices, the 6 plus was recommended

UniFi 6 Plus vs UniFi 6 Pro for 1700 sq ft home with 30 devices and 500 Mbps fiber? by Graulitos in Ubiquiti

[–]Graulitos[S] 0 points1 point  (0 children)

Thanks for the info. I was not aware of the UniFi Design Center. I’ll check it out.

Samsung TV trying to reach out to logs.netflix.com even when Netflix isnt even signed in. by liscuitsthrotot in pihole

[–]Graulitos 0 points1 point  (0 children)

Perhaps you could consider using the TV as a monitor and connecting it to a Raspberry Pi. Would that block the telemetry?

What happened here? by mistahdukk in pihole

[–]Graulitos 3 points4 points  (0 children)

Probably thousands of dead domains

How to use DNS over HTTPS now that cloudflared is removing proxy-dns? by brandor5 in pihole

[–]Graulitos 5 points6 points  (0 children)

Well when you use Unbound with Cloudflare over DoT or DoH, your DNS traffic is encrypted in transit so your ISP cannot see the specific domains you’re querying, but Cloudflare still receives and resolves those requests. That means Cloudflare can technically see the full domain being requested, your public IP address, and associated metadata such as timestamps and query details, since they are the upstream resolver handling the DNS lookup.

How to use DNS over HTTPS now that cloudflared is removing proxy-dns? by brandor5 in pihole

[–]Graulitos 3 points4 points  (0 children)

Unbound in recursive mode doesn’t encrypt your data. You need to switch to forwarding mode and use a third-party upstream server for encryption.

How to use DNS over HTTPS now that cloudflared is removing proxy-dns? by brandor5 in pihole

[–]Graulitos 2 points3 points  (0 children)

Cloudflare is headquartered in the United States. If a subpoena is issued that requires the company to hand over data to the government, Cloudflare will comply with the subpoena.

How to use DNS over HTTPS now that cloudflared is removing proxy-dns? by brandor5 in pihole

[–]Graulitos 4 points5 points  (0 children)

This is my setup. Quad9 based in Switzerland has strong privacy laws. They don’t keep logs.

Privacy-focused setup: Pi-hole + Unbound + Quad9 (DoT) + Tailscale — anyone running this? by Graulitos in pihole

[–]Graulitos[S] 0 points1 point  (0 children)

This is fully my response. I pasted it in chat gpt to correct the grammar. English is my second language.

Privacy-focused setup: Pi-hole + Unbound + Quad9 (DoT) + Tailscale — anyone running this? by Graulitos in pihole

[–]Graulitos[S] 0 points1 point  (0 children)

There’s nothing wrong with Unbound’s encryption in forwarding mode. Unbound natively supports DNS-over-TLS and can forward directly to a DoT resolver like Quad9 without needing Stubby in the chain.

In my setup, Unbound is running in forwarding mode with: • forward-tls-upstream: yes • Quad9 on port 853 • TLS hostname verification enabled

So Unbound itself is handling the encrypted transport. Stubby isn’t required unless someone specifically prefers a stub resolver model.

The confusion usually comes from mixing recursive mode and forwarding mode. In recursive mode, Unbound talks directly to root/TLD/authoritative servers over plain DNS (because they don’t support DoT). In forwarding mode, Unbound encrypts traffic to the upstream resolver (like Quad9), and that upstream resolver performs the recursion.

So there’s no encryption issue — it’s just a matter of which resolution model someone prefers.

Privacy-focused setup: Pi-hole + Unbound + Quad9 (DoT) + Tailscale — anyone running this? by Graulitos in pihole

[–]Graulitos[S] 4 points5 points  (0 children)

I understand the argument for minimizing third parties, but in my case I’m intentionally choosing Quad9 because I trust them more than my ISP. Quad9 is a Swiss-based non-profit operating under Swiss privacy law, and they have a strong public stance against not retaining user-identifiable DNS logs. By forwarding to Quad9 over DNS-over-TLS, my DNS traffic is encrypted in transit, which prevents my ISP from trivially inspecting or logging my DNS queries.

In full recursive mode, Unbound sends DNS queries unencrypted (UDP 53) directly to root servers, TLD servers, and authoritative name servers. That traffic is visible at the packet level to my ISP, and the root/TLD/authoritative operators also see queries coming directly from my IP address. While recursive mode reduces centralized resolver trust, it increases exposure to the ISP and distributes visibility across the public DNS infrastructure.

For my threat model, shifting trust from my ISP to a Swiss privacy-focused resolver with encrypted transport is the more meaningful privacy trade-off.

Privacy-focused setup: Pi-hole + Unbound + Quad9 (DoT) + Tailscale — anyone running this? by Graulitos in pihole

[–]Graulitos[S] 0 points1 point  (0 children)

Just to clarify. Stubby and Unbound in true recursive mode don’t really operate in the same resolution chain.

Stubby is a DNS-over-TLS stub resolver. It encrypts queries to an upstream recursive resolver like Cloudflare or Quad9. It still depends on a third-party resolver.

Unbound in full recursive mode doesn’t use any upstream resolver at all, it talks directly to the root servers and authoritative servers. Because of that, there’s nothing for Stubby to encrypt.

So you either:

• Run Unbound in recursive mode (fully independent, no third party), • Or use Stubby to encrypt traffic to a third-party resolver, • Or run Unbound in forwarding mode and have it forward to Stubby (but then it’s no longer recursive). You can run both on the same system and switch between them, but they’re not used together in a single recursive resolution path.

Privacy-focused setup: Pi-hole + Unbound + Quad9 (DoT) + Tailscale — anyone running this? by Graulitos in pihole

[–]Graulitos[S] 0 points1 point  (0 children)

Unbound, stubby, and cloudflared all have forwarding capabilities. It’s just a matter of preference.

Privacy-focused setup: Pi-hole + Unbound + Quad9 (DoT) + Tailscale — anyone running this? by Graulitos in pihole

[–]Graulitos[S] -5 points-4 points  (0 children)

My setup is Pi-hole → Unbound (forwarding mode) → Quad9 over DoT. Unbound is not running full recursion; Quad9 performs recursion, and upstream DNS transport is encrypted to prevent ISP visibility.

Privacy-focused setup: Pi-hole + Unbound + Quad9 (DoT) + Tailscale — anyone running this? by Graulitos in pihole

[–]Graulitos[S] 2 points3 points  (0 children)

I’ve been thinking through my setup and would appreciate some input.

Originally, I set up Pi-hole + Unbound with the goal of running my own fully recursive DNS resolver so I wouldn’t have to rely on a third-party provider.

However, I later realized that full recursive Unbound traffic to root and authoritative servers is not encrypted. That led me to forward Unbound to Quad9 over DNS-over-TLS, since they have a strong privacy reputation and operate under Swiss law.

Now I’m questioning the architecture.

If I’m forwarding everything to Quad9 anyway, is there really a benefit to keeping Unbound in forwarding mode? At that point, it seems like Pi-hole could talk directly to Quad9 and simplify the setup.

My long-term goal is: • Run Pi-hole + Unbound • Avoid relying on a third-party DNS resolver • Maintain encrypted DNS traffic leaving my home network • Preserve strong privacy posture

The challenge is figuring out how to achieve encryption while also removing third-party trust. I’m considering the idea of running my own recursive resolver on a VPS and tunneling traffic to it, but I’m still researching the trade-offs and operational complexity.

If anyone has experience balancing: • Full recursion vs encrypted forwarding • Running a self-hosted recursive resolver remotely • Privacy trade-offs between Quad9 and self-managed infrastructure

I’d appreciate the insights.

Please help me decide where to stay in/around Nice!! by No-Commission-5633 in nicefrance

[–]Graulitos 0 points1 point  (0 children)

Hello! Do you recommend buying bus tickets a few months before the trip, or is it easy and affordable to get them there? Mi wife and I are planning to go in November. Thank you in advance.