my family is moving into a much bigger house than we used to have. we use amazon echos as an intercom system through the announcement feature. because our house is bigger, i’m being forced to get one myself for my room. i haven’t needed one for years because i use their app on my phone and i can see their announcements as a notification and i can also kill off most of its tracking by DNS. unfortunately my parents don’t understand this and are forcing me to get one. what can i do to limit its tracking?

  • Hellfire103
    link
    fedilink
    English
    arrow-up
    10
    ·
    edit-2
    5 months ago

    MSCHF made a device called an Alexagate, which jams the microphones using ultrasound and is turned on and off by clapping.

    It’s a bit expensive, though ($100).

    https://alexagate.com/

    Otherwise, as you mentioned, you can use DNS to block the tracking. NextDNS has a built-in blocklist specifically for Alexa.

    • yoshisaur@lemm.eeOP
      link
      fedilink
      arrow-up
      4
      ·
      5 months ago

      thanks for the suggestion! as for nextDNS, i was already thinking of using this however you cannot change the DNS servers used on alexa devices. i was thinking of setting up openWRT on a pi and using that as a router specifically for our alexa devices with a nextDNS profile installed, but im not sure if alexa’s default to the router’s DNS or amazon’s. even if it does use the router’s DNS, does it backup to Google’s DNS (8.8.8.8) like Roku does?

      • xuv@lemmy.blahaj.zone
        link
        fedilink
        arrow-up
        7
        ·
        edit-2
        5 months ago

        With opnwrt you can do DNS hijacking, where you force redirect DNS requests for other servers to your own DNS server. This works as long as they aren’t encrypted (DNS over HTTPS or TLS), which most devices don’t use.

      • Darkassassin07
        link
        fedilink
        English
        arrow-up
        5
        ·
        edit-2
        5 months ago

        I specify my LAN DNS servers (2 pihole instances, main + a backup for redundancy) in my routers DHCP settings, so they are the DNS servers handed out to all LAN clients; then I have an iptables rule on the router blocking all port 53 traffic from leaving the network unless it came from those LAN DNS servers. This means only the piholes can reach external dns; everything else is required to use the LAN DNS servers or receive no response. Then the piholes have full control over what can and cannot resolve to an IP.

        I haven’t found a device that doesn’t work with this setup. I used to have a couple google homes before I wised up, they worked fine behind this setup.