Is it possible for encryption to harm cybersecurity?
Guest Post: Does the development of encrypted DNS help or hinder cybersecurity?
Guest Post: Does the development of encrypted DNS help or hinder cybersecurity?
To what extent have these encrypted DNS technologies been taken up in the public Internet?
Guest Post: How does DoH compare to the default DNS-over-UDP using port 53 (Do53) around the world?
Guest Post: Study shows clients can distribute DNS queries across a set of popular recursive resolvers without performance degradation.
Guest Post: Looking for a way to improve privacy and security of your DNS? Run it through Tor.
Guest Post: DoH resolver lists are not comprehensive, which makes it difficult for network administrators to entirely block DoH connections.
Guest Post: A free (even for commercial use), generic, TLS decryption proxy for protocols using TLS encryption.
Guest Post: The consultation closed six months ago but the promised analysis and conclusions have yet to be published, so Andrew Campling did his own.
Guest Post: A lot of groups develop great cybersecurity intelligence. Can we apply that knowledge via public resolvers?
Guest Post: New DNS benchmarking tool aims to simulate real clients and their behaviour.