• BlameTheAntifa@lemmy.world
      link
      fedilink
      arrow-up
      10
      ·
      1 day ago

      They still work together. Pi-hole is an excellent second line of defense, but an active firewall tells you about what is trying to make connections and asks for your consent. Block lists are great, but they aren’t impenetrable. If you want to know exactly what your device and software are doing, you should also be using an active firewall.