That's somewhat similar to how apple private relay works.
Privacy Guides
In the digital age, protecting your personal information might seem like an impossible task. We’re here to help.
This is a community for sharing news about privacy, posting information about cool privacy tools and services, and getting advice about your privacy journey.
You can subscribe to this community from any Kbin or Lemmy instance:
Check out our website at privacyguides.org before asking your questions here. We've tried answering the common questions and recommendations there!
Want to get involved? The website is open-source on GitHub, and your help would be appreciated!
This community is the "official" Privacy Guides community on Lemmy, which can be verified here. Other "Privacy Guides" communities on other Lemmy servers are not moderated by this team or associated with the website.
Moderation Rules:
- We prefer posting about open-source software whenever possible.
- This is not the place for self-promotion if you are not listed on privacyguides.org. If you want to be listed, make a suggestion on our forum first.
- No soliciting engagement: Don't ask for upvotes, follows, etc.
- Surveys, Fundraising, and Petitions must be pre-approved by the mod team.
- Be civil, no violence, hate speech. Assume people here are posting in good faith.
- Don't repost topics which have already been covered here.
- News posts must be related to privacy and security, and your post title must match the article headline exactly. Do not editorialize titles, you can post your opinions in the post body or a comment.
- Memes/images/video posts that could be summarized as text explanations should not be posted. Infographics and conference talks from reputable sources are acceptable.
- No help vampires: This is not a tech support subreddit, don't abuse our community's willingness to help. Questions related to privacy, security or privacy/security related software and their configurations are acceptable.
- No misinformation: Extraordinary claims must be matched with evidence.
- Do not post about VPNs or cryptocurrencies which are not listed on privacyguides.org. See Rule 2 for info on adding new recommendations to the website.
- General guides or software lists are not permitted. Original sources and research about specific topics are allowed as long as they are high quality and factual. We are not providing a platform for poorly-vetted, out-of-date or conflicting recommendations.
Additional Resources:
- EFF: Surveillance Self-Defense
- Consumer Reports Security Planner
- Jonah Aragon (YouTube)
- r/Privacy
- Big Ass Data Broker Opt-Out List
Just an fyi. DoH is a fucking nightmare for network management. For example, if you use a pihole on your network, you 100% do NOT want devices using encrypted DNS.
I have a mini PC that is always on that runs my NTP and DNS, and it's upstream DNS is quad nine out of Switzerland. (9.9.9.9). I tend toward the same usage patterns daily, and about a third of my requests never leave my home DNS to get resolved.
The TTL nowadays is about 3600 seconds, so I think that at about that rate your DNS server would flush stored entries every hour one by one and ask to 9.9.9.9 an update. That's basically how every DNS server works (and I guess that even the ones embedded in router's works like that with caching). Is your setup different? If yes, in which way? Thanks
I set it up a long time ago, so I don't honestly remember. I followed some guide, and did a few domain redirects to point at stuff on my home network and to shut Zuck out of my life, but I didn't do anything crazy. So, I doubt it, but I don't know.
@Wander @privacyguides I think that’s what ODoH is. Apple also does something like that with their private relay service.
However, it still allows the last DNS provider in the chain to see all queries, even if they don’t know the exact source.