Eavesdroppers and censors can still monitor what you’re viewing even if you’re using encrypted DNS
Guest Post: Researchers have found it’s possible to identify web pages visited by a user by analysing DoH traffic.
Guest Post: Researchers have found it’s possible to identify web pages visited by a user by analysing DoH traffic.
Guest Post: Centralized DoH ‘by default’ is a net-negative for everyone’s privacy and that even in later years it will not improve privacy outside of the most privacy hostile environments.
While encryption may help protect user privacy, for the measurement community it creates significant challenges.
Guest Post: Researchers examine whether an adversary can deduce websites visited using a set of IP addresses originating from a user’s device.
Guest Post: How prevalent are DoT and DoH projects, and what languages are developers using to implement them?
QNAME Minimisation has been billed as an efficient means to protect your privacy in the DNS. But are you using it?
Opinion: Do we need to rethink the terms of privacy and consent to align with today’s data collection methods?
A changing Internet poses some tough questions for the IETF.
Are our security and privacy standards keeping pace with the progression and use of technology?
Geoff Huston seeks to further clarify the potential privacy issues associated with the widespread use of DNS over HTTPS (DoH).