Post 9l55MSZ2pc8l7XFh3Y by gid@cybre.space
 (DIR) More posts by gid@cybre.space
 (DIR) Post #9l2m4U9nsqfBP3F2fo by shibayashi@communicating.cypherpunk.observer
       2019-07-20T14:29:18.646411Z
       
       0 likes, 0 repeats
       
       Want to encrypt your mobile DNS traffic? Here’s how you can do it.DNS over TLSThere is built-in support for it in Android Pie (9). You can choose a provider there, e.g. @applied_privacy that supports it.DNS over HTTPSBetter general support (also on desktop) but with more attached metadata than DoT.Android users can use for example the app Intra. It provides a built-in list of some providers that support DoH. You can also choose a custom one.iOS users can use the app DNSCloak which does the same thing.Both apps use the VPN interface of the phone to tunnel all DNS queries over the encrypted connection.If you know how to enable DoT for iOS or older Android devices or an app that enables DoH that is available with FDroid, please comment below :)
       
 (DIR) Post #9l2mIPC78EI647xZaa by wowaname@anime.website
       2019-07-20T14:31:45.975732Z
       
       0 likes, 0 repeats
       
       @shibayashi @applied_privacy is there dnscrypt on phone
       
 (DIR) Post #9l2nSPlZxZ5egosvcu by shibayashi@communicating.cypherpunk.observer
       2019-07-20T14:44:50.629166Z
       
       1 likes, 0 repeats
       
       @wowaname @applied_privacyDNSCloak is just a iOS GUI and wrapper for dnscrypt-proxy 2.Apparently there is a Magisk module that provides dnscrypt-proxy for Android: https://github.com/Magisk-Modules-Repo/dnscrypt-proxy
       
 (DIR) Post #9l4uOnfQF9z9eZ9H8a by tethre@cybre.space
       2019-07-21T02:15:47Z
       
       0 likes, 0 repeats
       
       @shibayashi @applied_privacy but then your isp can see the connections after the dns-request anyway?
       
 (DIR) Post #9l4uOoAcNAwHDJkBlI by shibayashi@communicating.cypherpunk.observer
       2019-07-21T15:11:55.147822Z
       
       0 likes, 0 repeats
       
       @tethre @applied_privacyThat’s right, but it’s one additional thing that is helping. If encrypted SNI is working, then, if I understood this correctly, only the destination IP address is still visible unencrypted.
       
 (DIR) Post #9l55MSZ2pc8l7XFh3Y by gid@cybre.space
       2019-07-21T03:10:36Z
       
       1 likes, 0 repeats
       
       @tethre @shibayashi @applied_privacy DNS-over-TLS protects you in scenarios where you don't trust who is providing DNS (for example, public WiFi). It also makes it very difficult to hijack DNS requests.