Advice Request CleanBrowsing DNS vs NextDNS vs ControlD DNS

Please provide comments and solutions that are helpful to the author of this topic.

CleanBrowsing DNS vs NextDNS vs ControlD DNS

  • CleanBrowsing DNS

    Votes: 0 0.0%
  • NextDNS

    Votes: 16 44.4%
  • ControlD DNS

    Votes: 3 8.3%
  • Other

    Votes: 17 47.2%

  • Total voters
    36
If your router is using DNS over TLS, does it still make sense to use DNS over HTTPS in the browser?
 
No dns blocking can ever block YouTube ads. That's not possible. You'll require specific https filtering extension or app for that.
UBlock on my PC's FireFox and also on my Android's is blocking Youtube ads.

But obviously you can not block the ads inside the YT app. For that I would recommend "NewPipe" which is amazing.... but since it does not have any trackers therefore, the suggestions will not be as it is in the official YT app.

Privacy is always give and take.
 
If some network is blocking the use of encrypted DNS, what are your choices? Anything on the software level, like an adblocker, what can prevent them for seeing the websites you visit?
 
If some network is blocking the use of encrypted DNS, what are your choices? Anything on the software level, like an adblocker, what can prevent them for seeing the websites you visit?

I dont think that is possible to block encrypted DNS on a network level without blocking "everything" (ex: DNS over HTTPS); nothing besides a VPN or a Tor browser (not recommended) can prevent that kind of snoop.

With DNS over HTTPS (DoH), DNS queries and responses are encrypted and sent via the HTTP or HTTP/2 protocols. DoH ensures that attackers cannot forge or alter DNS traffic. DoH uses port 443, which is the standard HTTPS traffic port, to wrap the DNS query in an HTTPS request. DNS queries and responses are camouflaged within other HTTPS traffic, since it all comes and goes from the same port.
 
I dont think that is possible to block encrypted DNS on a network level without blocking "everything" (ex: DNS over HTTPS); nothing besides a VPN or a Tor browser (not recommended) can prevent that kind of snoop.
I use a network that it shows in the Wifi settings "This network doesn't allow the use of cryptographed DNS", when I use NextDNS, I get no internet.
 
I use a network that it shows in the Wifi settings "This network doesn't allow the use of cryptographed DNS", when I use NextDNS, I get no internet.

Did you tried DNS Over HTTPS (DoH) ?

The other methods can be blocked, DoH cant.

Try to use NextDNS directly in your browser or via YogaDNS client with the appropriate configuration.
 
I dont think that is possible to block encrypted DNS on a network level without blocking "everything" (ex: DNS over HTTPS); nothing besides a VPN or a Tor browser (not recommended) can prevent that kind of snoop.
All you need is the destination IP address to block DoH. The packet has to be going somewhere even if you can’t read it.
 
Did you tried DNS Over HTTPS (DoH) ?

The other methods can be blocked, DoH cant.

Try to use NextDNS directly in your browser or via YogaDNS client with the appropriate configuration.
It's an iPhone. How to change NextDNS to DoH? I don't know which encryption it uses by default.
 
  • Like
Reactions: Nevi and Kongo
All you need is the destination IP address to block DoH. The packet has to be going somewhere even if you can’t read it.

This is more theoretical than pratical, DoH is camouflaged within other HTTPS traffic.
 
  • Like
Reactions: Kongo
This is more theoretical than pratical, DoH is camouflaged within other HTTPS traffic.
No you just use an ip table list of DoH providers and block packets heading to those IPs through port 443. It’s cumbersome, but organizations are definitely capable if they want to deal with the hassle.
 
No you just use an ip table list of DoH providers and block packets heading to those IPs through port 443. It’s cumbersome, but organizations are definitely capable if they want to deal with the hassle.

By this method?


Dont seen that effective.
 
  • Thanks
Reactions: Kongo
By this method?


Dont seen that effective.
It's effective to block, ineffective to redirect because it breaks the encryption. You would just have no ability to resolve anything and have to maintain the IP tables.
 
  • Like
Reactions: Kongo
  • Like
Reactions: blackice
Anyway, sorry to derail the conversation. The point is it can be blocked, easily by corps with the resources to do it. But it would be noticeable and very difficult to redirect. One would know they are being blocked.