TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Ask HN: How to make home network secured

17 点作者 mraza007超过 4 年前
How can I make my home network more secured and block adtrackers and few websites and social media apps for the kids. What services I can use

8 条评论

slovette超过 4 年前
Honestly, as a network engineer with 4 kids, we’re kinda just screwed.<p>The popular responses here are going to be about Pi-Hole and NextDNS (which I use today), but overall it’s a losing battle and all of it is easily circumvented.<p>With DNS-over-HTTPS becoming more and more prevalent in all things end-user devices, I suspect by this time next year using any kind of traditional DNS controls will be worthless.<p>We could go super heavy handed and deploy some home version of enterprise packet inspection, but that’s a whole bag of worms.<p>As for kiddos, I’ve gotten to the point where I combine good communication over obscurantism, device level traffic logging&#x2F;monitoring, all mixed with a hard off switch for communications at and after certain times to be the winning ticket.<p>As far as tracking and ads... we’re all going to lose that battle fairly soon. The same tech we all praise as good for privacy is also great for data collection and advertising.
评论 #24450629 未加载
mikebos超过 4 年前
It are somewhat seperate problems. But let&#x27;s begin with ad&#x27;s, tracking and malware&#x2F;bots&#x2F;whatever uses a domainname. You have two different options SaaS and selfhosted. It&#x27;s a matter of opinion but I would say PiHole (selfhosted) or NextDNS (SaaS) a no cost SaaS would be using the AdGuard DNS servers in your router instead of the ones of your ISP. Personally I use NextDNS, it&#x27;s robust and thanks to the options I can tweak it to my needs without having to upgrade &#x2F; update stuff. The second part, keeping my network secure is a bit more involved, it can mean anything from simply having different wireless networks for different purposes (IOT, video surveillance and guests are common) to packet inspection and intrusion detection. Mostly, use the seperate wireless network strategy and forget about the rest, the maintenance is too high and the gain too low for personal networks.
评论 #24448211 未加载
jonpalmisc超过 4 年前
Regarding blocking ads, etc. - you might want to check out Pi-hole. It can run on a Raspberry Pi (hence the name) or just about anything. It’s pretty easy to set up. Works for blocking ads and trackers, and you can set up additional blocks as well (for Instagram, for example).
runjake超过 4 年前
Pi-hole along with any custom blacklists you want (eg. for social media, porn, etc).<p><a href="https:&#x2F;&#x2F;pi-hole.net&#x2F;" rel="nofollow">https:&#x2F;&#x2F;pi-hole.net&#x2F;</a><p>Blocklists are all over the place, do some googling. I like <a href="https:&#x2F;&#x2F;firebog.net" rel="nofollow">https:&#x2F;&#x2F;firebog.net</a> as a jump off point.
评论 #24448184 未加载
S1lv3rsurf3r超过 4 年前
Does it really matter how private &amp; secure your network is when the nsa can capture all traffic in the upstream? They can&#x27;t spy on any US citizens they say, that&#x27;s the rule, &amp; they have many oversight committees such as Congressional oversight committees to watchdog them.<p>Tricky nsa moved the Upstream &amp; Downstreams to South Africa. So a US citizen&#x27;s data is no longer in the USA_technically...&amp; they can collect it. Bulk collection, encryption breaking, data mining with algorithms &amp; keywords....<i>but</i> they only keep it all for 72 hours then it gets securely deleted. That&#x27;s the way it is boys. And I&#x27;m not a hacker, at all &amp; I found this. I believe the thing to do is fly stealth under the radar at all times, as minimally as possible, and count the hours (72) between transmissions.
评论 #24448203 未加载
giantg2超过 4 年前
You can use ethernet connections whenever possible so you aren&#x27;t broadcasting as much info.<p>Not very helpful, but you can also reduce your wifi power and&#x2F;or place to in the basement (if you have one) to limit the range (physical attack surface). You can also schedule the wifi to turn off during hours that you don&#x27;t need it (11pm-6am?). This will reduce the amount of time someone could monitor&#x2F;attack via wifi. It also reduces your exposure to RF, if you&#x27;re into that.
mixmastamyk超过 4 年前
- Make sure you&#x27;re on a NAT.<p>- Use privacy-respecting mobile devices, such as Apple.<p>- Use an anti-tracking measures as mentioned like pi-hole and&#x2F;or hostfile service.<p>- Forbid social media <i>apps,</i> they are a scourge.<p>- Use privacy-respecting browsers like Firefox and Safari. Set protection higher than standard.<p>- Consider browser extensions like ghostery, etc.
评论 #24446668 未加载
avenger123超过 4 年前
I just bought a firewalla blue device that handles this. It&#x27;s a bit expensive but it really is a no hassle solution. So far I don&#x27;t regret the purchase.