My ISPs DNS lookup takes literally one second every time, so I went with Quad9, it really sped up my browsing. Do you know any other alternatives?

  • tal@lemmy.today
    link
    fedilink
    English
    arrow-up
    0
    ·
    17 days ago

    You could probably just piggyback off some random DNS server out there that permits public queries. I doubt that most domains are logging everything.

    $ egrep "^[a-z]+$" /usr/share/dict/words|sed "s/$/.com/"|xargs -n1 host -t ns|grep "name server"|cut -d" " -f 4|awk '!seen[$0]++'|xargs -n1 host www.slashdot.org|awk '/^$/ {f=0} /has address/ {f=1} /^Name:/ {if (f) {print}}'
    Name: ns2.afternic.com.
    Name: ns1.bluehost.com.
    Name: ns2.bluehost.com.
    Name: ns-570.awsdns-07.net.
    Name: ns1.sedoparking.com.
    Name: ns02.cashparking.com.
    Name: ns01.cashparking.com.
    Name: ns1.namefind.com.
    Name: ns2.namefind.com.
    

    etc.

    That’ll look up the DNS server for a bunch of domains and, omitting duplicates, list all of the ones that can resolve “www.slashdot.org”, which I imagine likely means that they’ll also probably be willing to resolve other domains.

    • Björn@swg-empire.de
      link
      fedilink
      arrow-up
      0
      ·
      17 days ago

      Cloudflare must be an NSA honeypot. It must be. Cloudflare has immense power to man-in-the-middle basically every website on the planet.

      And if they aren’t directly run by the NSA they probably have at least one agent working undercover. Probably from basically every other spy agency on the planet as well.

      • einfach_orangensaft@sh.itjust.works
        link
        fedilink
        arrow-up
        0
        ·
        17 days ago

        Can confirm the Cloudflare office in the NSA basement is right next to the NordVPN office and that math prof that solved the math problem of AES decryption who they have there chained to a radiator

      • unexposedhazard@discuss.tchncs.de
        link
        fedilink
        arrow-up
        0
        ·
        17 days ago

        Sure yeah, but i think the better argument for switching is decentralization. Its dangerous for everyone to depend on one or a few monopolistic DNS providers. Thats also why you shouldnt use cloudflare.

        • cracked_void@kbin.earthOP
          link
          fedilink
          arrow-up
          0
          ·
          17 days ago

          You’re totally right. In the long run I’ll probably get myself some selfhosted solution, but right now I want to focus on other things. Also, I stay away from Cloudlare as far as I can. I don’t trust them.

          • muxika@piefed.muxika.org
            link
            fedilink
            English
            arrow-up
            0
            ·
            16 days ago

            What would be a better alternative that you’d recommend to hide a public IP? I’m familiar with self-hosting, so I could deploy the necessities.

    • kalpol@lemmy.ca
      link
      fedilink
      arrow-up
      0
      ·
      16 days ago

      The only downside here is that the root servers don’t use TLS so your queries are plain text.

      • Link@rentadrunk.org
        link
        fedilink
        English
        arrow-up
        0
        ·
        16 days ago

        Why does that matter when your ISP will know the IP of the server and a reverse lookup is probably very easy to find what domain you visited?

        • khannie@lemmy.world
          link
          fedilink
          English
          arrow-up
          0
          ·
          16 days ago

          Reverse lookups are comparatively time consuming and a single IP may resolve to many domain names.

  • ZoteTheMighty@lemmy.zip
    link
    fedilink
    arrow-up
    0
    ·
    17 days ago

    I’ve been using a PiHole for years now. It’s super easy to set up. In practice, it’s been the most reliable thing I keep on a pi. Technically, you don’t need to host it on a raspberry pi, but you should host it on an always-on computer on your network.

    Kind of a different way of looking at security; you can’t guarantee someone’s not keeping DNS logs, but you can guarantee that your DNS logs on a hard drive in your house aren’t being shared.

  • neidu3@sh.itjust.worksM
    link
    fedilink
    English
    arrow-up
    0
    ·
    16 days ago

    I always used 4.2.2.2 and 4.2.2.1. Not sure how privacy friendly they are, but probably miles more than 8.8.8.8

      • neidu3@sh.itjust.worksM
        link
        fedilink
        English
        arrow-up
        0
        ·
        16 days ago

        Well, it belongs to Google, so I assume they use it for logging which addresses do which lookups, and correlate this with their other fingerprinting databases. I very much doubt they run a public DNS just to be nice.

        • Balinares@pawb.social
          link
          fedilink
          arrow-up
          0
          ·
          16 days ago

          I mean, that’d be a major GDPR breach, be hard to extract any signal from because queries will usually be coming from a relay or from behind a NAT so you can’t tell who the query even originates from, and DNS is cached heavily too so you only get a small fraction of the queries anyway. I’m not seeing a way the calculus work in favor, basically.

          OTOH the question of why they’d even run a public DNS is interesting, yeah. Running a public DNS is cheap and helps the Internet work better, and they make more money when the Internet works better since that adds up to more page views. Less charitably, though, it’s possibly just a thing from back when they were an engineering company first and foremost and did that kind of stuff, and now they can’t turn it off without breaking a lot of things and causing a lot of costly anger.