pi-hole-unbound-wireguard
tailscale
pi-hole-unbound-wireguard | tailscale | |
---|---|---|
11 | 1,047 | |
501 | 23,118 | |
0.6% | 3.7% | |
3.5 | 9.9 | |
10 months ago | 8 days ago | |
Go | ||
GNU General Public License v3.0 only | BSD 3-clause "New" or "Revised" License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
pi-hole-unbound-wireguard
-
What would be the best way to VPN into my pihole from my mobile phone while I am out of the home?
In addition follow this until you get to the WireGuard install and install PiVPN instead: https://github.com/notasausage/pi-hole-unbound-wireguard.
- Issues with Pihole/Unbound/WireGuard setup.
-
Can't resolve DNS names in PiHole installation on raspberry pi installation.
I installed PiHole with Unbound, following this guide: https://github.com/notasausage/pi-hole-unbound-wireguard and after those, I also installed wireguard. Everything was working so far, but when I entered via ssh to the raspberry pi, to enable NFS shares there, it started having problems resolving the domains:
-
Adding PiHole to Amplifi
You navigate to the dns page of pi hole and input the static IP of your Pihole. Again doesn’t matter if you are wired or wireless. I love this guide: https://github.com/notasausage/pi-hole-unbound-wireguard. I use everything up to the WireGuard instructions and just use piVPN because I think it’s a better solution and I still use WireGuard!
-
all ports blocked by my ISP
I used guide: https://github.com/notasausage/pi-hole-unbound-wireguard
-
WireGuard VPN + TV Tuner question
Using WireGuard or some other solution? Man - with a few pi’s, it was super simple. I used this guide as a guide: https://github.com/notasausage/pi-hole-unbound-wireguard For the server side set up. But when it came to the WireGuard piece I installed piVPN for WireGuard. Worked first time.
- PiVPN+Pihole+unbound question
-
Has anyone manage to install OpenVPN + Pi-Hole + Unbound in your home network? To use it as DNS inside network and as VPN outside of the network.
I also prefer in combo with WireGuard. There are some good tutorials out there. See this start to finish guide for setting up locally Pihole +Unbound +WireGuard or, even easier, this docker-compose tutorial called WireHole. If you want to go the cloud-based route there are a bunch of options. See this Cloudblock tutorial. It looks like it is still being maintained.
- Open Pi-Hole DNS - Message from BSI
-
AdGuard Home processing time
notasausage/pi-hole-unbound-wireguard: Turning your Raspberry Pi into an ad-blocking VPN with built-in DNS resolution using Pi-Hole, Unbound & WireGuard. (github.com)
tailscale
-
Self-hosting like a final boss: what I actually run on my home lab (and why)
Tailscale: mesh VPN, zero config. Just install and forget. Perfect for personal/private access.
-
Your laptop can run a full devops stack here’s how I set mine up
Optional: Use Tailscale to access your lab from any device securely
-
HomeLab
For accessing my server from outside and anywhere, I use Tailscale. This service creates a VPN between all your desired devices. It offers much better security and less risk than using port forwarding or exposing ports/services to the whole internet. Runs fantastic — and even for free!
-
EasyTier – P2P mesh VPN written in Rust using Tokio
How does this compare to Tailscale?
Rust vs Go is one difference. What else?
Tailscale: https://github.com/tailscale/tailscale
-
A new generation of Tailscale access controls
> For an example of how invasive this is for the average user, this person discovered Tailscale trying to collect ~18000 data points per week about their network usage based on the number of blocked DNS requests for `log.tailscale.com`: https://github.com/tailscale/tailscale/issues/15326
18000 data points per week seems IMHO pretty low (only 1.7 requests per minute for a whole network? Unlikely, even my Android phone does way more that 1.7 requests per minute just to ad networks, nevermind everything else on the network summed), it's probably way more.
18000 data points is also a lie, that's a different issue - the issue of UDP DNS sucking in general so your average application/OS keeps reissuing requests if they think the UDP packet got dropped.
-
Golang for FFI Flutter Plugins
But I only saw the usability of Go as an alternative to Python for scripting/CLI application development, and obviously for backend development. Especially when it comes to gRPC (but that's a story for another time). I never looked at Go as an option for the development of FFI Flutter plugins, until sometime last year, I got acquainted with Tailscale. Tailscale has built its products around Go, including mobile applications. For reference, I'd strongly encourage you to check the source code of their Android client and the Swift library inside the main libtailscale repository. So, somebody did it... A successful company uses Golang for its clients.
-
Ditching Obsidian and building my own
Tailscale has made all of their client source code available for anyone to view so if you want to confirm that you’re not sending unencrypted data or keys through their servers you’re more than free to do so.
https://github.com/tailscale/tailscale
I think there is some merit to setting up wireguard (e.g. you want more devices than what Tailscale offers for free, or their servers become unreliable for some reason)
But people who push the “scarey boogeyman will look at your data” with Tailscale are either technically illiterate or overly-paranoid.
-
The Umbrel OS for home-lab, self-hosted tech solutions
For example, the home networking, personal VPN, we may use Tailscale. https://tailscale.com/ which is also listed on the Umbrel App Store.
-
How I made my Home Server accessible outside my home
Here then comes VPN (Virtual Private Network) which is basically establishes a protected network connection when using public networks. I already have relevant experiences with this one as some of my previous projects involves private repositories that can only be accessed by connecting into the client's VPN. There are many solutions for this specific use case like WireGuard, but in this particular blog, I chose Tailscale.
-
Optimizing My Dev Workflow in 2025
I had 2 old laptops sitting around, both 10 years old. I turned both into a home server. Installed Ubuntu Server, set up Docker, and now I run all my containers remotely. With Tailscale, I can securely connect to it like it's on the same network. This way, my MacBook doesn't have to run MongoDB, Redis, or RabbitMQ anymore. That alone freed up a lot of memory. I can even run other services like HomeAssistant, MailHog, Immich, etc.
What are some alternatives?
Jackett - API Support for your favorite torrent trackers
netbird - Connect your devices into a secure WireGuard®-based overlay network with SSO, MFA and granular access controls.
my-pihole-blocklists - Create custom pi-hole blocklists
headscale - An open source, self-hosted implementation of the Tailscale control server
raspi - Raspberry Pi note [Moved to: https://github.com/koji/RaspberryPi-Note]
AdGuardHome - Network-wide ads & trackers blocking DNS server