I'm late to this party so I don't expect an answer. But the only thing I see different from pihole's document on this is DNS locations. Which you use for custom logging etc.?But isn't required ya? I left everything the way piholes document told me too. I came here only to find out and make sure my traffic was encrypted. As my ISP has decided to look at where we are going, and I don't like that.
Thanks for the video and very instructive. Quick question.. Since doh is encrypted, how is Pihole able to apply any filtering when everything now will be encrypted?
@@beamnetworks1 Oh, I read that Pihole can only block unencrypted DNS requests, which means if a device is using a browser with Secure DNS enabled, it will bypass Pihole correct?
NICE !! good video man !
I'm late to this party so I don't expect an answer. But the only thing I see different from pihole's document on this is DNS locations. Which you use for custom logging etc.?But isn't required ya? I left everything the way piholes document told me too. I came here only to find out and make sure my traffic was encrypted. As my ISP has decided to look at where we are going, and I don't like that.
The DNS locations are inside of Cloudflare Zero Trust, not PiHole. Hope this helps
which VM manager are you using on mac? Thanks! Nice video!
I don’t use one on Mac. I just remotely connect to a Linux vm
Thanks for the video and very instructive. Quick question.. Since doh is encrypted, how is Pihole able to apply any filtering when everything now will be encrypted?
Yes. Encryption happens after pihole, so Pihole can still block requests.
@@beamnetworks1 Oh, I read that Pihole can only block unencrypted DNS requests, which means if a device is using a browser with Secure DNS enabled, it will bypass Pihole correct?
@mr.boniato6402 That is correct.
I believe there a way to do this using a UDM pro too, right?
This hasn’t been released into GA yet I don’t think. Early access may have it but I haven’t stayed up to date with release logs recently.