The very same people who tell us malware will obey our endpoint DNS configuration are busy deploying web browsers which default to doing just the opposite.https://twitter.com/taviso/status/1181760420056428544 …
I don't follow. If you're authorized to administer the endpoints, just don't use DoH and no sacrifices will be necessary?
-
-
I can control the endpoint and the applications *I* deploy to it. Controlling what malware decides to do is another matter.
-
I still don't follow, if you're asking malware authors to promise never to use DoH, isn't that what you were making fun of earlier? To quote you, "Pretty please use the DNS resolver I configured?".
- 12 more replies
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.