cross-posted from: https://programming.dev/post/37646129

Source: Reddit postPrivate front-end.

Samsung Statement to Android Authority:

Samsung is committed to innovation and enhancing every day value for our home appliance customers. As part of our ongoing efforts to strengthen that value, we are conducting a pilot program to offer promotions and curated advertisements on certain Samsung Family Hub refrigerator models in the U.S. market.

As a part of this pilot program, Family Hub refrigerators in the U.S. will receive an over-the-network (OTN) software update with Terms of Service (T&C) and Privacy Notice (PN). Advertising will appear on certain Family Hub refrigerator Cover Screens. The Cover Screen appears when a Family Hub screen is idle. Ad design format may change depending on Family Hub personalization options for the Cover Screen, and advertising will not appear when Cover Screen displays Art Mode or picture albums.

Advertisements can be dismissed on the Cover Screens where ads are shown, meaning that specific ads will not appear again during the campaign period.

    • Godnroc@lemmy.world
      link
      fedilink
      English
      arrow-up
      2
      ·
      13 minutes ago

      I’m speculating, but it wouldn’t change a thing. You would still need to request domain addresses from a server somewhere, but traffic between your device and server would be encrypted in transit. The DNS server would also be verifiable to prevent imitators.

      So, the request would go to the PiHole and if it was not being filtered the PiHole would make the request of whatever upstream server is configured same as before.

    • PerogiBoi@lemmy.ca
      link
      fedilink
      English
      arrow-up
      18
      ·
      6 hours ago

      VPN running on a WRT router? I know very little about this stuff I just know the buzzwords for street cred.

      • wetbeardhairs@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        43
        arrow-down
        1
        ·
        6 hours ago

        Pihole’s act as a DNS or “Dynamic Name Server”. All internet traffic is IP based once it leaves your home because routers dont know how to forward traffic for “https://samsung-ad-hell.com/”, so there is a dedicated kind of packet for “Where is https://samsung-ad-hell.com/ located?” and that is a DNS Lookup. The Pihole pretends to know because it maintains a list of bad urls that host websites that only support privacy exploitation and advertisements and tells them “oh you want to go to 0.0.0.0, that’s where you’ll find your stuff” as it snickers.

        But DNS Lookups were always plain text. When your laptop says “Where is https://big-booties.com/” your ISP knows you want porn. Now there is a new variant called “Secure DNS Lookup” which encrypts the url you’re asking about. The ISP knows you’re asking for a domain’s IP, but it can’t know which one and it no longer cares. Neat.

        The trouble is that the Pi-Hole can no longer protect us from all the stupid fucking smart devices that want to earn a fraction of a penny per device by spying on us because THEY use the new Secure DNS Lookup.

        • tetris11@lemmy.ml
          link
          fedilink
          English
          arrow-up
          15
          ·
          5 hours ago

          It’s not a huge issue, you need a DoH resolver now (e.g. your browser which has a secure connection to a secure DNS server) which cannot block <script> from requesting the ad, but can definitely block <script> from displaying it once the domain resolves.

          Extra overhead though, agreed

          • wetbeardhairs@lemmy.dbzer0.com
            link
            fedilink
            English
            arrow-up
            5
            arrow-down
            2
            ·
            5 hours ago

            Wow really? I was under the impression that the SSL part would prevent the pihole from being able to spoof itself as a legitimate DNS

            • very_well_lost@lemmy.world
              link
              fedilink
              English
              arrow-up
              23
              ·
              5 hours ago

              prevent the pihole from being able to spoof itself as a legitimate DNS

              Not to be pedantic, but a pihole is legitimate DNS. Being able to do your own DNS has always been a fundamental part of the Internet Protocol, and is used a lot in enterprise to handle name resolution for internal subnets and stuff like that.

              • wetbeardhairs@lemmy.dbzer0.com
                link
                fedilink
                English
                arrow-up
                5
                ·
                4 hours ago

                Being pedantic is totally OK here - we’re talking about SSL’s spoof protection. I’ll have to look up how any rando can host a DNS that supports DNS/HTTPS when a system would be expecting a valid SSL cert that declares who it was issued to and by whom and the requester is expecting a particular whom.

            • FishFace@lemmy.world
              link
              fedilink
              English
              arrow-up
              4
              ·
              4 hours ago

              SSL operates after name resolution. It’s one way that information about your browsing habits is not protected by application-layer encryption; the domains you’re visiting are available to your DNS server.

              • frongt@lemmy.zip
                link
                fedilink
                English
                arrow-up
                1
                ·
                49 minutes ago

                Unless you’re using DNS over TLS!

                Or DNS over https, but that’s kind of gross.

        • borth@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          7
          ·
          6 hours ago

          Interesting… Well, this prompted me to search what Pi-Hole has done for this, and they seem to have a way to continue blocking even DoH, using “cloudfared”, which is another daemon that needs to run with Pi-Hole… They can’t possibly think their enshittification will continue to work.

      • cygnus@lemmy.ca
        link
        fedilink
        English
        arrow-up
        8
        arrow-down
        1
        ·
        6 hours ago

        Me yelling “enhance” at my router so it blocks ads better

        • ayyy@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          1
          ·
          2 hours ago

          I can tell you didn’t read the manual because it obviously states that you have to be staring over the top of sunglasses for that configuration option to work.