With today's smart devices capable of accessing the network, we are very familiar with the term 'DNS.' We can easily change DNS on Android, switch DNS on iPhone for easier access to the Internet, and the steps to change DNS on iPhone are relatively simple, helping you access blocked websites like Facebook.
Although Internet Service Providers (ISPs) and network-level hackers cannot access and track HTTPS protocol, there is something you may not know. ISPs can still view all your DNS requests and know which websites you have accessed.
Most activities on the Internet use DNS queries, making DNS queries a fundamental block of the Internet. DNS acts like the phone book of the Internet, translating readable web addresses (such as thehackernews.com) into IP addresses.
DNS queries and responses are sent in plain text (using UDP or TCP) without encryption, allowing hackers to attack and eavesdrop. Consequently, the level of privacy and security has significantly decreased.
By default, Internet Service Providers (ISPs) handle DNS queries from their servers. When users enter a website's name into the browser's address bar, the initial query goes to the ISP's DNS server to find the IP address of the website. Ultimately, it displays information (metadata) for their ISP.
Furthermore, DNS Security Extensions, commonly known as DNSSEC, only provide data integrity, not data security.
To address this issue, last year the Internet Engineering Task Force (IETF) proposed a test feature called DNS over TLS (RFC 7858), functioning similarly to HTTPS.
Similar to the Transport Layer Security (TLS) security protocol, which encrypts HTTPS connections with cryptography, DNS-over-TLS significantly enhances security by authenticating end-to-end DNS queries.
Google adds support for DNS over TLS to the Android Open Source Project (AOSP), currently in the testing phase. This allows users of smartphones to enable or disable the DNS over TLS feature in the Developer Options settings.
However, activating only the DNS over TLS feature still allows ISPs to know which websites you've visited. Server Name Indication (SNI), an extension of the TLS protocol, provides additional information to ISPs, such as the server being contacted by the browser when the handshake process begins.
To achieve complete anonymity, users must still utilize a combination of reliable VPN services with the DNS-over-TLS protocol.
The DNS over TLS feature is currently in the testing phase, and it's highly likely that this feature will be integrated and available in the next Android version, such as Android 8.1.
Not stopping there, Google is currently grappling with issues related to their flagship device, the Google Pixel 2, experiencing screen image retention problems. The Pixel 2 screen image retention issue is believed by many to stem from the use of its POLED display. If you're interested, read this article for immediate updates from Mytour.vn.