Hey yo hey yo fellow pirates:

Wondering if there is any good free alternative to NextDNS, I know I can self-host my own DNS server on my LAN but I need a mobile solution.

I’m currently testing AdGuard Public DNS, what do you think about it? Should I use another alternative? In that case which alternative do you recommend?

That’s all for now, thx in advice and keep calm, keep pirating.

    • Black Skinned Jew@lemmynsfw.comOP
      link
      fedilink
      English
      arrow-up
      2
      ·
      edit-2
      2 years ago

      Sounds reasonable thx for the info mate, but one question, I guess I wouldn’t be allowed to use a VPN at the same time, right?

      Edit: I mean unless I setup the VPN at the server.

      • rambos@lemm.ee
        link
        fedilink
        English
        arrow-up
        2
        ·
        2 years ago

        You are right, I can toggle between home VPN (pihole) and payed VPN, but cant use both at the same time. Im sure you can also route trafic to use payed VPN trought your own wireguard, but I never tried that

    • LEDZeppelin@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      ·
      2 years ago

      I have pihole setup for home. WAN you please elaborate what you mean for when I’m not home and on my cell phone data?

      • rizoid@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        4
        ·
        2 years ago

        In my wireguard config I have it’s DNS set to the IP of my pihole. That’s all I had to do. I’ve had this config running for a bit so I don’t remember if I had to change anything else.

    • maus@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      1
      ·
      2 years ago

      This is what I do, but with Unbound dns on opnsense with dns forwarding to my business cloudflare account which gives me additional filtering options.

      Allows me to properly do dns caching and filtering in Unbound and then leverage cloudflare to do additional security threat filtering on top.

      Then it’s just a matter of setting up a firewall rule to redirect any port 53 to the local Unbound dns and blocking all 853 traffic to ensure all iot devices aren’t using their own hard-coded dns.