2. Make Your List
Close the terminal window; we’re done with the command line. (See, that wasn’t so bad.) Open a web browser and navigate to http://pi.hole. This is where you’ll control Pi-hole and decide what to block and what to allow. You’ll see some default options to block the most egregious trackers on the internet, but you can always fine-tune things to suit your needs by adding the web addresses where specific services live. Try nuking ads in Twitch or blocking Alexa requests so your kids can’t summon pizzas or Ubers. Pi-hole.net and the r/pihole subreddit are great places to find web addresses to add to your blacklist.
3. Reroute the Traffic
Keep your Pi-hole powered on and connected to your network; plug it directly to your router if you can. Now open your router’s control panel in a web browser (consult your router’s documentation for this part) and look for your network’s DHCP/DNS settings for your LAN—not your WAN. In the DNS field, type in the IP address of your Raspberry Pi. (You wrote it down earlier, right?) This will force all inbound data to go through the Pi and get checked against your lists before going out to your devices. Now restart your networked devices one by one; this forces them to reconnect to the internet through the Pi-hole.
If Firefox is your browser of choice, there’s one extra step. Depending on your configuration, that browser may ignore your local DNS server and instead use DNS over HTTPS, also called DoH. There are some additional settings you’ll need to tweak; find those instructions in the official Pi-hole documentation.
That’s it. You’re up and running with Pi-hole. Want to see how much gunk you’re now blocking? Check out the dashboard at pi.hole/admin.
If you buy something using links in our stories, we may earn a commission. Learn more.
This article appears in the October issue. Subscribe now.
More Great WIRED Stories