Flexible Split Horizon DNS with Tailscale and Pi-hole

2025-07-10
Flexible Split Horizon DNS with Tailscale and Pi-hole

This post details configuring Pi-hole to achieve split horizon DNS using Tailscale. The author uses Tailscale's mesh network to provide different DNS resolutions for LAN and Tailscale clients. This solves access problems caused by services lacking secondary authentication and geo-blocking. The process involved troubleshooting Docker networking and Pi-hole interface binding, ultimately resolved by using host networking and adjusting Pi-hole settings. The solution enhances security and simplifies network management.

Read more
Development

Dissecting a Romance Scam: Social Engineering and Technical Details

2025-03-14
Dissecting a Romance Scam: Social Engineering and Technical Details

The author, acting as a mark, investigated an elaborate romance scam. The scammer, using social engineering, created a fictitious persona, "Aidana," a dentist in Kazakhstan, employing stolen photos and forged documents to manipulate victims. The analysis details the scammer's communication tactics, technical tools (like The Bat! email client and Photoshop), and psychological manipulation. The author reveals the scam's mechanics and warns readers about similar schemes.

Read more