<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>raspberry pi &#8211; Gig City Geek</title>
	<atom:link href="https://gigcitygeek.com/tag/raspberry-pi/feed/" rel="self" type="application/rss+xml" />
	<link>https://gigcitygeek.com</link>
	<description></description>
	<lastBuildDate>Wed, 15 Apr 2026 17:08:51 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://gigcitygeek.com/wp-content/uploads/2026/01/cropped-GigCityGeek_Logo-32x32.png</url>
	<title>raspberry pi &#8211; Gig City Geek</title>
	<link>https://gigcitygeek.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>DIY Ad Blocking: Raspberry Pi Hardware Choices</title>
		<link>https://gigcitygeek.com/2026/04/21/pi-hole-hardware-configuration-minimal/</link>
					<comments>https://gigcitygeek.com/2026/04/21/pi-hole-hardware-configuration-minimal/#respond</comments>
		
		<dc:creator><![CDATA[Laronski]]></dc:creator>
		<pubDate>Tue, 21 Apr 2026 13:00:00 +0000</pubDate>
				<category><![CDATA[Hardware]]></category>
		<category><![CDATA[Smarter Not Harder]]></category>
		<category><![CDATA[ad blocking]]></category>
		<category><![CDATA[configuration]]></category>
		<category><![CDATA[diy]]></category>
		<category><![CDATA[dns]]></category>
		<category><![CDATA[home network]]></category>
		<category><![CDATA[minimalism]]></category>
		<category><![CDATA[pi-hole]]></category>
		<category><![CDATA[raspberry pi]]></category>
		<category><![CDATA[unbound]]></category>
		<guid isPermaLink="false">https://gigcitygeek.com/?p=3655</guid>

					<description><![CDATA[Discover the surprisingly simple hardware requirements for running Pi-hole with Unbound. Learn why configuration is key and what Raspberry Pi models are suff...]]></description>
										<content:encoded><![CDATA[<p>When I first set up <a title="" href="https://en.wikipedia.org/wiki/Pi-hole" target="_blank" rel="noopener">Pi-hole</a> at home, I overthought the hardware so badly that my wife just looked at the pile of boxes on the table and asked if “that little thing” was really worth a whole Saturday.</p>
<p>It was a <a title="" href="https://en.wikipedia.org/wiki/Raspberry<em>Pi&#8221; target=&#8221;</em>blank&#8221; rel=&#8221;noopener&#8221;>Raspberry Pi 3B</a>, a cheap <a title="" href="https://en.wikipedia.org/wiki/SD<em>card&#8221; target=&#8221;</em>blank&#8221; rel=&#8221;noopener&#8221;>SD card</a>, and an <a title="" href="https://en.wikipedia.org/wiki/Ethernet" target="<em>blank&#8221; rel=&#8221;noopener&#8221;>Ethernet</a> cable I dug out of a drawer, and it has quietly handled ad blocking, <a title="" href="https://en.wikipedia.org/wiki/Domain</em>name<em>system&#8221; target=&#8221;</em>blank&#8221; rel=&#8221;noopener&#8221;>DNS</a>, and <a title="" href="https://www.unbound.info/" target="_blank" rel="noopener">Unbound</a> ever since. That experience convinced me that for most of us tinkering with home networks, the magic is in the config, not in the silicon.</p>
<p><h4>A Practical Sweet Spot</h4>
</p>
<p>If you want to run Pi-hole with Unbound and maybe a <a title="" href="https://en.wikipedia.org/wiki/Virtual<em>private</em>network&#8221; target=&#8221;_blank&#8221; rel=&#8221;noopener&#8221;>VPN</a>, any Pi with an Ethernet port and at least 512 MB of RAM is enough for basic use. People are happily running this stack on old Pi 2s, 3B/3B+, Zero 2 W with a USB Ethernet adapter, and even ancient model B boards with 512 MB of RAM and 100 Mbps Ethernet.</p>
<p>For light to moderate home traffic, DNS lookups just are not that heavy, and Pi-hole plus Unbound typically uses only a couple hundred megabytes of memory.</p>
<p><h4>Let’s Talk Tradeoffs</h4>
</p>
<p>Where you start to notice limits is when you add heavier VPN use or lots of chatty devices, like multiple corporate laptops or a house full of game consoles and smart TVs.Some folks report that a 3B+ can lag a bit in the web UI or pile up queries under stress, while a Pi 4 or a small x86 mini PC stays snappy in the same scenario.</p>
<p>If my son is gaming and I am on video calls for hours, I would rather have a Pi 4 or a cheap used Dell Wyse or OptiPlex micro than push a Zero-class board to its limits.</p>
<p><h4>Here’s the Catch</h4>
</p>
<p>You can absolutely look at Chinese Pi alternatives or tiny Android boxes, but the real issue there is software support, not raw power. Boards that work well with <a title="" href="https://armbian.com/" target="<em>blank&#8221; rel=&#8221;noopener&#8221;>Armbian</a> or <a title="" href="https://dietpi.com/" target="</em>blank&#8221; rel=&#8221;noopener&#8221;>DietPi</a>, or Android boxes that can cleanly run Debian, can make rock-solid Pi-hole hosts, but obscure clones with sketchy <a title="" href="https://en.wikipedia.org/wiki/Firmware" target="_blank" rel="noopener">firmware</a> are asking for trouble.</p>
<p>For something that sits at the heart of your network, I am picky; I would rather repurpose an old phone, a $10 thin client, or a known <a title="" href="https://en.wikipedia.org/wiki/Single-board<em>computer&#8221; target=&#8221;</em>blank&#8221; rel=&#8221;noopener&#8221;>SBC</a> than plug a random <a title="" href="https://www.aliexpress.com/" target="<em>blank&#8221; rel=&#8221;noopener&#8221;>AliExpress</a> special directly into my <a title="" href="https://en.wikipedia.org/wiki/Local</em>area<em>network&#8221; target=&#8221;</em>blank&#8221; rel=&#8221;noopener&#8221;>LAN</a>.</p>
<p><h4>A Solid Net Positive</h4>
</p>
<p>From everything I have seen and run myself, this hardware landscape is a net positive for home network tinkerers: you have a spectrum from ultra-cheap <a title="" href="https://en.wikipedia.org/wiki/Raspberry<em>Pi</em>Zero&#8221; target=&#8221;<em>blank&#8221; rel=&#8221;noopener&#8221;>Pi Zero</a> setups with USB Ethernet up through used business mini PCs that can <a title="" href="https://en.wikipedia.org/wiki/Virtualization" target="</em>blank&#8221; rel=&#8221;noopener&#8221;>virtualize</a> multiple services.</p>
<p>The real win is that you do not need cutting-edge gear to build a reliable, self-hosted DNS and ad-blocking stack, and you can start with whatever old box is lying around and only upgrade if your usage actually demands it.</p>
<p>If you keep that mindset, your Pi-hole will quietly do its job while the rest of the family just notices that the web is faster and a lot less annoying.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://gigcitygeek.com/2026/04/21/pi-hole-hardware-configuration-minimal/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>USB Condoms: Protecting Your Data From Airport Hooks</title>
		<link>https://gigcitygeek.com/2026/03/05/usb-condom-data-protection/</link>
					<comments>https://gigcitygeek.com/2026/03/05/usb-condom-data-protection/#respond</comments>
		
		<dc:creator><![CDATA[Laronski]]></dc:creator>
		<pubDate>Thu, 05 Mar 2026 14:00:00 +0000</pubDate>
				<category><![CDATA[Hardware]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data security]]></category>
		<category><![CDATA[digital hookup]]></category>
		<category><![CDATA[hardware breach]]></category>
		<category><![CDATA[juice jack]]></category>
		<category><![CDATA[phone security]]></category>
		<category><![CDATA[portability]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[raspberry pi]]></category>
		<category><![CDATA[usb condom]]></category>
		<guid isPermaLink="false">https://GigCityGeek.com/?p=3045</guid>

					<description><![CDATA[Discover the surprising threat of 'juice jacking' – where hackers use public USB ports to steal your data. Learn how a simple 'USB condom' can protect your...]]></description>
										<content:encoded><![CDATA[<p>So, I recently stumbled down a rabbit hole involving something called a &#8220;<a title="Amazon.com: PortaPow USB Data Blocker - Protect Against Juice Jacking (Red, 1) : Electronics" href="https://www.amazon.com/PortaPow-3rd-Gen-Data-Blocker/dp/B00QRRZ2QM" target="_blank" rel="noopener">USB condom</a>,&#8221; and after I finished laughing at the name, I realized it’s actually a brilliant bit of low-tech brilliance for our high-tech paranoia. It turns out that plugging your phone into a random airport power pole is the digital equivalent of licking a subway handrail—you’re basically inviting a total stranger to have an intimate, unconsented conversation with your data.</p>
<p><h3>The Anatomy of a Digital Hookup</h3>
</p>
<p>Here is the deal: your standard USB cable is a two-way street. It has four main pins: two for &#8220;juice&#8221; (power) and two for &#8220;talk&#8221; (data). When you’re at 2% battery and desperate, you see a public USB port as an oasis. But that port might be &#8220;<a title="Juice jacking warnings are back, with a new twist | Malwarebytes" href="https://www.malwarebytes.com/blog/news/2025/06/juice-jacking-warnings-are-back-with-a-new-twist" target="_blank" rel="noopener">Juice Jacking</a>&#8221; you.</p>
<p>This isn&#8217;t just a tech-bro myth; it’s a hardware breach where a hacker hides a tiny computer—like a <a title="r/raspberry<em>pi on Reddit: Is the Pi a security threat?&#8221; href=&#8221;https://www.reddit.com/r/raspberry</em>pi/comments/tt4zvh/is<em>the</em>pi<em>a</em>security<em>threat/&#8221; target=&#8221;</em>blank&#8221; rel=&#8221;noopener&#8221;>Raspberry Pi</a>—behind the wall plate. While you think you’re getting a top-off, the wall is actually rummaging through your photos and saved passwords.</p>
<p><h3>Why You Should &#8220;Wrap It Up&#8221;</h3>
</p>
<p>The &#8220;condom&#8221; part is actually a data blocker, like the ones made by PortaPow. It’s a tiny adapter that physically deletes the data pins. It’s a beautifully &#8220;dumb&#8221; solution; because the physical copper wires for data aren&#8217;t there, the malware literally has no road to travel on to reach your phone.</p>
<p>It’s also a &#8220;charging accelerator,&#8221; because it tricks your phone into ignoring the <a title="USB in a NutShell - Chapter 3 - USB Protocols" href="https://www.beyondlogic.org/usbnutshell/usb3.shtml" target="_blank" rel="noopener">data handshake</a> and just sucking up power at max speed, which is great when you’ve only got ten minutes before boarding.</p>
<p><h3>The 2026 Reality Check</h3>
</p>
<p>Is this overkill? Usually. Most phones now ask if you &#8220;Trust this computer.&#8221; But the latest 2026 research into &#8220;<a title="ChoiceJacking: Compromising Mobile Devices through Malicious Chargers like a Decade ago | USENIX" href="https://www.usenix.org/conference/usenixsecurity25/presentation/draschbacher" target="_blank" rel="noopener">ChoiceJacking</a>&#8221; shows that rigged ports can now send invisible touch commands to &#8220;click&#8221; that Trust button for you before you even see it. Your software can be tricked, but a missing piece of wire cannot.</p>
<p>What can we take from this? Well, while you’re statistically more likely to lose your luggage than your identity at a charging station, a $10 adapter is a pretty cheap &#8220;digital seatbelt.&#8221; If there is anything I can apply to this, it’s that in a world of complex AI and sophisticated hacking, sometimes the best solution is just pulling the plug on the conversation entirely. I will end with close this out with: if you can&#8217;t find a standard AC wall outlet, just wrap your cable. Do you think this is genuine travel safety or just more tech-paranoia?</p>
<p>Drop a comment and let me know if you were a victim or if you’ve ever actually seen a &#8220;sketchy&#8221; port in the wild!</p>
]]></content:encoded>
					
					<wfw:commentRss>https://gigcitygeek.com/2026/03/05/usb-condom-data-protection/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
