Avoid Monetizing Your Sensitive DNS Data by Using DNSCrypt-proxy

Levente Csikor
CodeX
Published in
14 min readSep 16, 2023

--

While utilizing encrypted DNS and public recursive resolvers safeguards your DNS data from eavesdroppers, you do, however, make your data vulnerable to the very public recursive resolver you are using.

Photo by Markus Spiske on Unsplash

The preceding statement might come across as a touch forceful, but it aims to mirror the common misconception of security we often feel when our network or application traffic is encrypted. Let’s briefly delve into why your level of protection might not be as robust as you assume.

In the wake of the Edward Snowden case in 2013 and the alleged mass surveillance conducted by the NSA (National Security Agency), the landscape of Internet privacy has undergone a profound transformation. Privacy has emerged as a pivotal concern for individuals, organizations, and governments worldwide.

The leaks exposed the vulnerability of digital communications to government agencies, nation-states, and malicious actors, even those exploiting open WiFi hot-spots. This heightened awareness of the need to protect personal data prompted the development of security protocols, technologies, and policies, empowering individuals to safeguard their privacy in our increasingly interconnected world.

Securing DNS

--

--

Levente Csikor
CodeX
Writer for

Researcher with a PhD degree in Computer Science. He writes about tools and experiences to boost your research, and occasionally orthogonal stuff. (cslev.vip)