My ISP is AT&T (located in the U.S.) and I have issues loading random websites. Currently have Google DNS set in my router, which works great. But I’m guessing there’s a better, more private, option?

  • umami_wasabi@lemmy.ml
    link
    fedilink
    arrow-up
    21
    ·
    1 day ago

    I recently switched to NextDNS. I used to run my own AdGuard Home with multiple DNS provider as upstream.

  • Darkassassin07@lemmy.ca
    link
    fedilink
    English
    arrow-up
    17
    ·
    1 day ago

    Regular DNS can be monitored, intercepted, and modified however your ISP decides, even with you specifying custom DNS servers.

    I run pihole on my LAN, with cloudflared as its upstream DNS. Cloudflared translates regular DNS into DOH using cloudflare and quad9 as the upstream DOH providers (configurable).

    Pihole DOH with cloudflared

    Finally I block all port 53 (dns) traffic at the router so it cannot leave my LAN. All LAN devices that want regular DNS are forced to use the LAN DNS server which wraps their requests in DOH for them. (as well as blocking ads, tracking/telemetry, and known malware sites)

    • Lemmchen@feddit.org
      link
      fedilink
      arrow-up
      1
      ·
      13 hours ago

      Why would you need cloudflared? Can’t you justbset DoH/DoT servers as a backend in Pi-Hole?

      • Darkassassin07@lemmy.ca
        link
        fedilink
        English
        arrow-up
        1
        ·
        edit-2
        13 hours ago

        Pihole doesn’t directly support DOH. What I linked is their official guide for implementing it: using cloudflared.

        There is other ways you can do this. This is just what I’ve been uaing.

    • drspod@lemmy.ml
      link
      fedilink
      arrow-up
      6
      ·
      1 day ago

      What ISP do you use that makes you trust Cloudflare more than your ISP? You must really be between a rock and a hard place.

      • Darkassassin07@lemmy.ca
        link
        fedilink
        English
        arrow-up
        2
        ·
        13 hours ago

        I’m not all that concerned about either tbh; I was just already capturing DNS traffic and funneling it through pihole for the customizable blocking, and figured I may as well add DOH while I’m at it.

        Just sharing the knowledge for those that are interested. You can use any DOH provider you like.

  • irotsoma@lemmy.blahaj.zone
    link
    fedilink
    arrow-up
    7
    ·
    edit-2
    1 hour ago

    I use a local unbound DNS server on my router with Quad9 as upstream. I actually have google DNS entirely blocked/rerouted on my router because google uses it for advertising tracking, but I get creepers out by targeted ads showing up in random places when I do do something on a totally unrelated site. Most important thing, though, is to use DNSSEC DNS over TLS or DNS over HTTPS to reduce middlemen from using your DNS info to track what sites you visit and sell that data. Of course ISPs still see the destination of all of your data for tracking what sites you visit unless you use a VPN or similar tools, so you can’t hide it from them that way.

    Edit: DNS over TLS not DNSSEC, totally different thing…

    • ITeeTechMonkey@lemmy.world
      link
      fedilink
      English
      arrow-up
      2
      ·
      14 hours ago

      DNSSEC is a means of authenticating the data receives was not tampered with, such as MITM attacks, thus ensuring data integrity. It uses PKI but it’s not an alternative to DoH or DoT which encrypts the DNS traffic, either over HTTPS or TLS, providing confidentiality.

      DNSSEC can be used in conjunction with DoH or DoT to achieve the Security CIA triad - Confidentiality, Integrity, Authenticity.

      • irotsoma@lemmy.blahaj.zone
        link
        fedilink
        arrow-up
        1
        ·
        1 hour ago

        No. I don’t use DoH inside my network because I redirect DNS traffic on my primary VLAN to a pihole for ad and malware reducing. But I also control what has access to that VLAN pretty strictly. I have another VLAN for guests and untrusted devices that doesn’t use the redirecting, but does use the Unbound server as the default DNS, just doesn’t enforce it. And I have an even more locked down VLAN for self-hosted servers that also doesn’t use the pihole, but does use Unbound.

  • drspod@lemmy.ml
    link
    fedilink
    arrow-up
    5
    arrow-down
    2
    ·
    1 day ago

    In regards to all the answers in this thread, consider: If you’re not paying for it with money, then what are you paying for it with?

    The most private DNS is a recursive resolver.

    • Onno (VK6FLAB)@lemmy.radio
      link
      fedilink
      arrow-up
      3
      ·
      1 day ago

      I’ve been using Adguard public DNS for over a year across my LAN and it works great, with much less hassle than a pihole, which I previously used for years.

      I miss the ability to add random hosts to either black or white lists, but in reality only used it sporadically.

  • carl_dungeon@lemmy.world
    link
    fedilink
    English
    arrow-up
    3
    ·
    1 day ago

    I use the cloudflare dns, but there are all kinds of adguard ones too. The Adguard app itself has a big list of options for the fallback.

    If you’ve never used adguard, check it out, it can run as a container or on a pi, you just point your router dns at it

    • sunzu2@thebrainbin.org
      link
      fedilink
      arrow-up
      7
      ·
      1 day ago

      Don’t use these unless you are properly configure them but even then… They are used for tracking

      Mullvad and quad9 are better for privacy people

      There are others tho