• hillbicks@feddit.de
    link
    fedilink
    arrow-up
    10
    ·
    9 months ago

    Yes and no. If your isp is still providing unencrypted DNS for you, then they can still see the domain name you’re visiting.

      • Ullebe1@lemmy.ml
        link
        fedilink
        arrow-up
        8
        ·
        9 months ago

        Ordinary DNS requests are always plaintext and readable to anyone between you and the DNS server. So regardless of which DNS server you use, your ISP can see all your DNS lookups. For any amount of privacy for DNS, the minimum is something like DNS-over-TLS or DNS-over-HTTPS, the latter of which Firefox uses by default in some countries and supports everywhere.

        • morrowind@lemmy.ml
          link
          fedilink
          arrow-up
          6
          ·
          9 months ago

          I mean with this + DNS over HTTPS can we guarantee the isp can no longer see anything?

        • dan@upvote.au
          link
          fedilink
          arrow-up
          5
          ·
          9 months ago

          Ordinary DNS requests are always plaintext and readable to anyone between you and the DNS server.

          Not just readable… The ISP can inject their own responses too. Regular DNS is both unencrypted and unauthenticated, with most clients not enforcing DNSSEC.

          • dan@upvote.au
            link
            fedilink
            arrow-up
            4
            ·
            9 months ago

            It’s easy to setup something like AdGuard Home that provides malware blocking, ad blocking if you’re interested in that, and supports DNS-over-HTTPS out of the box (unlike PiHole, which needs a bunch of manual setup)

          • vsh@lemm.ee
            link
            fedilink
            English
            arrow-up
            3
            ·
            9 months ago

            If you can protect it from leaks than why not, but beware the fines are big