• 1 Post
  • 23 Comments
Joined 10 months ago
cake
Cake day: January 13th, 2024

help-circle



  • Depends. Some women cannot have enough milk production, some have over production. It’s a bit of a gamble most of the times. In countries like Brazil there is a sort of system where is possible to donate milk in case of over production, and in case you don’t have or not enough, you can have some of it (not sure about the details, but for me this sounds great).

    As for people saying formula is better than breastmilk, believe or not, Nestlé is to blame for this. Back in the day they touted that all over the place, and at some point, they got penalties for saying such bs. The fun part? They are using the EXACT same tactics on some under developed countries so they can sell more. Quite frankly, Nestlé is really up there on companies to despise ( Exxon is possibly the top one, but Nestlé is not really that behind)







  • Do you want to know the kicker? There are banks (yes, you heard me right) that straight up don’t allow more than 20 chars. 20!!! And they say you got to use the app for X things because it’s secure and shit (e.g.: use the app to 2FA credit card transactions). Meanwhile, does not allow you to add a yubikey for Fido authentication







  • I was making a quick check, and yes, the DoH situation is a bit more dicey. From how I see it, the best way to make this work is to, at the firewall level, either block as much as possible any requests that look like DoH (and hope whatever was using that falls back to regular DNS calls) or setup a local DoH server to resolve those queries (although I am not sure if it is possible to fully redirect those). In that sense, pihole can’t really do much against DoH on its own

    EDIT: decided to look a bit further on the router level, and for pfsense at least this is one way to do this recipe for DNS block and redirect


  • Hm… I am not familiar with that device myself, and since I use opnsense for a while I forget most people do not use routers outside of the provided one.

    But in a theoretical sense, this firewall rule should look something like this:

    • origin of traffic is any IP that goes into port 53
    • outgoing traffic has to go to pi hole on port 53



  • Pi hole is an amazing tool and gives a lot of insight on what is being queried and blocked against the block lists. Also, makes completely transparent on the entire network to have nasty things blocked. One thing I will mention to make the setup better: make sure on the firewall level you can have a rule that makes every request for a DNS to go through pi hole. Some devices will use a hard coded DNS instead of respecting the one on the network