You may have noticed more (backdated) posts of photos recently, and that is simply because I’ve started to pull my photos from other servers to place them in my own bucket where I (presumably) have control over them. If not real “control”, I at least can retain ownership and IP rights to them.
As I continue to migrate my online existence over to this space, I will be removing photos from the vast databases I have created on other sites and, hopefully, removing access to that data for purposes of identification. I’m not exactly “going dark” per se, but I would prefer not to have a clear-cut topographical map of my face available to marketers (which is, rather clearly, where targeted marketing is headed).
Meanwhile, on social media, I will be replacing tags of me in photos with either tags of cartoons, popular media characters, or even inanimate objects in order to (hopefully) provide enough noise in the recognition algorithms to effectively camouflage myself from automatic recognition.
Maybe this is overly paranoid. Maybe I should start wearing a tinfoil hat. We’ll find out in a few years. Meanwhile, it’ll be a fun experiment!
As of right now, I have removed all photos of myself that I have posted to Facebook over the years. It was a major undertaking, to be sure, but I like the feeling of control that I have over my photos now.
They are, of course, still accessible through this website. I will add a proper link to the gallery in time.
The bigger question now is what to do about the dozens of photos I’m tagged in that aren’t mine. I would love to have access to these albums still, but I don’t know how best to manage that. For now, please don’t be alarmed if you notice me removing tags from your photos. I still love you all; I’m simply managing my data a little more cautiously.
I think the best course of action will be to tag myself as some odd object in one of the album’s photos, thus keeping me in the album, but sufficiently confusing Facebook’s algorithm by keeping the noise ratios high, which will help lead into the next phase of the Sparticus Experiment rather nicely.
Internet advertising was once a fairly benign minor annoyance that spiraled into the oft-lampooned dark world of pop-ups on top of pop-ups. In these early years, simple ad-blocking plugins for popular browsers like Netscape Navigator (and its successor, Mozilla Firefox) were enough to keep these nuisances at bay, but as advertising technology got more sophisticated, Web 2.0 became more commercialized, and surveillance capitalism became the business model du jour, ad-blockers have moved from convenience to absolute necessity while simultaneously become more difficult to implement at the browser level.
Most commercial websites now can detect ad-blocker software and refuse to serve content in response. In these cases, it becomes necessary to allow some level of ad servicing–usually through whitelisting specific sites–but this also comes at the extended (and immeasurable) cost of privacy. Advertising networks track users’ movements across the internet and serve consistent ads based on that user’s specific browsing history. In this Brave New World, a user’s very identity is a commodity that must be exchanged in order to participate in society. One must sell their soul in an asymmetrical exchange to merely experience the world outside while the buyer resells the soul indefinitely and reaps exponential profits.
Pi-Hole is an application that adjusts the balance of power back into the hands of the user by allowing ads to be served, but intercepting and dumping them into a “black hole” before being displayed. Additionally, Pi-Hole blocks trackers from “phoning home” by directing their calls into the same virtual black hole, thus allowing the user to retain control over their identity. The result is a cleaner, safer, and more pleasant user experience with faster page load times and less noise in the browsing experience. Granted, Pi-Hole does have a few flaws that are more difficult to work around (such as Google’s first-party tracking), but by-and-large, the application is well-worth the few minutes that it takes to set up.
In my current network arrangement, I have Pi-Hole installed on a Raspberry Pi Zero W plugged into a 5V wall wart and connected to the WiFi. It’s not the fastest arrangement, of course, but it has a very low power consumption and serves my needs at the moment. I have also tried using Pi-Hole installed on an Ubuntu virtual machine in my FreeNAS server, but I noticed that it resulted in a noticeable increase in system resources (and noise, considering the case sits behind my sofa) so I migrated to the Pi. If you have the hardware to spare, I would probably recommend a Pi3B+ or better as the right nexus of speed and power consumption.
Installation on the Pi is fairly straightforward, following the directions of the Pi-Hole website. The most difficult part seems to be arranging the DNS settings on your router (which isn’t altogether difficult, but it doesn’t enjoy the virtue of an automatic installation script). I will put together a setup guide for the FreeNAS instance in a future number, for those who may be inclined (or whenever I upgrade my server and stuff it in an air-conditioned closet).
Pi-Hole is not a silver bullet to stop advertising and privacy-invading browser trackers wholesale, but I do recommend it as another tool in the ever-growing arsenal that users can employ to reclaim some of their own power on the internet. I’m still playing around with the idea of obfuscation, and seeing if it is even worth considering (it probably isn’t, but it may just be for fun), and I have been implementing other changes that have made my life–both online and especially off–better and less stressful than it used to be.
I’ve been playing around a lot with my FreeNAS installation since assembling it last year as my “Pandemic Project” (which, of course, would become the first of many), and I’m constantly looking for new things to implement. Advertising has been a thorn in my side since the early days of the internet, so it seemed only logical that I should see what all the fuss with Pi-Hole was about!
Pi-Hole is most readily installed on a Raspberry Pi, but I’m trying to consolidate as much of my infrastructure as possible, so I thought I might have a go getting it working on the server. Unfortunately, FreeNAS is based on BSD while Pi-Hole is written for Linux (so there’s no plugin available), so we’ll have to install it on a virtual machine.
Installing Ubuntu Server on a Virtual Machine
The first thing we’ll need, of course, is the installation media. There’s a flavor of Pi-Hole written specifically for Ubuntu, so that seems to be the logical choice! My recommendation is to install the most compact version available, and the netboot installer image allows you to pick Ubuntu Server with minimal options. It’s a little difficult to find the correct download, so just grab the URL below:
Of course, if Bionic Beaver is outdated, just change the /bionic directory to the current version!
Back in FreeNAS, go to the Virtual Machines menu and add a new Linux VM. Give it a name that you’ll remember (“pihole” is a solid choice) and set the virtual CPU count to 1 and the memory size to 512MiB. On the Disks page, create a new AHCI disk and set its Zvol location to /data/pihole and size to 4GiB. When you get to the options for installation media, select “Upload an installer image file” and choose the mini.iso file you downloaded earlier. Once all your settings are configured, you can boot the virtual machine and install Ubuntu. The VNC option opens a virtual terminal that will allow you to connect to and interact with the virtual machine through the installation process.
If you are prompted for DNS servers, use Google’s (18.104.22.168 and 22.214.171.124) as a default for now.
When the install completes, Ubuntu will prompt you to remove installation media and reboot. Once you are disconnected from the VNC, stop the virtual machine and remove the installation media by deleting the CDROM from the “Devices” list under the virtual machine options.
Setting up Pi-Hole
Restart the virtual machine and connect to the VNC. Log into Ubuntu and invoke the following commands: