Attempts to block youtube video ads. Only works for video ads before video starts, not midrolls. Only blocks the first video ad in case of two ads before the video. Does not work 100% even then. Mainly intended for use with chromecast, as there are no other options like ublock. Works by keeping track of the timing between youtube content domain requests; if a youtube content domain is requested very shortly after another from the same device, it is assumed to be an ad and gets blocked. Almost no false positives, but limited effectiveness. Wanted to see if this approach could work and it turned out not as good as I had hoped.

Network-wide ad blocking via your own Linux hardware
FTLDNS™ (pihole-FTL) provides an interactive API and also generates statistics for Pi-hole®'s Web interface.
- Fast: stats are read directly from memory by coupling our codebase closely with
dnsmasq - Versatile: upstream changes to
dnsmasqcan quickly be merged in without much conflict - Lightweight: runs smoothly with minimal hardware and software requirements such as Raspberry Pi Zero
- Interactive: our API can be used to interface with your projects
- Insightful: stats normally reserved inside of
dnsmasqare made available so you can see what's really happening on your network
The official FTLDNS documentation can be found here.
FTLDNS (pihole-FTL) is installed by default when you choose to enable the Web interface when installing Pi-hole.
IMPORTANT!
FTLDNS will disable any existing installations of
dnsmasq. This is because FTLDNS isdnsmasq+ Pi-hole's code, so both cannot run simultaneously.
