**Breaking** DNS queries get sent to DNS resolver.https://twitter.com/davewiner/status/1026083616303050752 …
-
Show this thread
-
My first problem with this article is this paragraph. The defeatists attitude that an ISP already has access to one piece of data so we may as well just give them another is something I refuse to accept. Let's take away this data, one piece at a time.pic.twitter.com/RoUuMog0Va
1 reply 2 retweets 22 likesShow this thread -
With the widespread adoption of HTTPS we're already taking away specific information like what pages on a site you visit and while SNI may rat you on the hostname, there are plans to encrypt SNI in the future too. DOH is another piece of information you can protect *right now*.
2 replies 1 retweet 15 likesShow this thread -
Next up, how is your ISPs DNS server 'local' to you? With standard DNS anyone on the entire network path to the resolver can spy on you, but with DOH no one can. The suggestion that DNS is somehow better than DOH in this regard is just plain wrong.pic.twitter.com/qvzJbl1gPT
1 reply 2 retweets 15 likesShow this thread -
"Random DNS servers in an untrustworthy network"?... When is this ever not the case? At work? Use their resolver. At home? Use your ISPs resolver. Public WiFi? Use anyone's resolver. None of these are trusted. None of them!pic.twitter.com/PXeCKDbc35
1 reply 2 retweets 14 likesShow this thread -
Here's a question for you. Wherever you are right now, tell me who you're using for DNS resolution. At home, work, travelling, even on 4G. You never know who you're using for DNS resolution and who on the network is watching you use that DNS.pic.twitter.com/NzPjwWMwWE
9 replies 1 retweet 11 likesShow this thread
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.