The very same people who tell us malware will obey our endpoint DNS configuration are busy deploying web browsers which default to doing just the opposite.https://twitter.com/taviso/status/1181760420056428544 …
Isn't that just saying "Pretty please only use these protocols?", it's just a minor variation of what you were making fun of. Malware authors use their own protocols all the time? https://attack.mitre.org/techniques/T1094/ …
-
-
In general, I reject the argument that we shouldn't invent anything that malware might benefit from. Malware can and does abuse cryptography, email, irc, twitter, anything. The benefit to society of those things is too great to not invent them.

-
we disagree on the benefit to society. DoH promises that one's queries won't be spied upon. Instead it just aggregates the spying into the hands of larger entities who can then create a more full picture of my activity. to me that's *worse* than plaintext DNS.
- 7 more replies
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.