Conversation

DNS-over-TLS does have the advantage of a lighter and more efficient implementation but DNS-over-HTTPS doesn't add any substantial attack surface in practice as long since it's already present. Using regular HTTPS traffic over port 443 also makes it more censorship resistant.
1
1
They could improve the Tor network by asking people to opt-in to being a relatively low bandwidth relay. As long as the DNS server is a hidden service, it wouldn't put more burden on exit nodes which is the main bottleneck largely because it's so risky to run one in practice.
1
2
Similarly, they can still see the IP being connected to and in many but not all cases that's as good as seeing the domain name. The collateral damage can deter some of the blocking but I don't think it stops it in general. For IPv6, there's also generally not IP reuse like that.
1
There are some potential privacy issues with DNS-over-TLS and DNS-over-HTTPS due to implementations reusing connections. It mostly applies to using DNS-over-{TLS,HTTPS} with a VPN or Tor though. Without a VPN or Tor source IP address is enough to tie together the requests anyway.
1
Show replies