This graph of DNS requests by client at our cabin is a good example of how metadata and privacy interact. When did we get there? How many people were there? All reasonable things that you could derive from this metadata.
This graph of DNS requests by client at our cabin is a good example of how metadata and privacy interact. When did we get there? How many people were there? All reasonable things that you could derive from this metadata.
@jthingelstad Extra credit: What in the house is sending a big network request every 10 minutes and what other thing every 15? I’m guessing TVs.
@esjewett so looking at Pi-Hole DNS activity in your house during periods when nobody is home is an upcoming hobby of mine. I hope to restore more of my privacy by combining that with the new Pi-Hole v5 ability to group blocklists by device. The good news is that most of these "smart" devices seem to handle surveillance failure silently.