If you use the Firefox web browser, here’s an important update that you need to be aware of.
Starting today, Mozilla is activating the DNS-over-HTTPS security feature by default for all Firefox users in the U.S. by automatically changing their DNS server configuration in the settings.
That means, from now onwards, Firefox will send all your DNS queries to the Cloudflare DNS servers instead of the default DNS servers set by your operating system, router, or network provider.
As you may know, DNS-over-HTTPS (DoH) protocol performs DNS lookups — i.e., finding the server I.P. address of a certain domain name — over an encrypted connection to a DNS server rather than sending queries in the plaintext.
This privacy-focused technology makes it harder for man-in-the-middle attackers, including your ISPs, to manipulate DNS queries, eavesdrop on your Internet connection, or learning what sites you visit.
“This helps hide your browsing history from attackers on the network, helps prevent data collection by third parties on the network that ties your computer to websites you visit,” the company said.
However, the way Mozilla implemented DNS-over-HTTPS in the Firefox web browser also received criticism over in past few months over favoring Cloudflare and instead of trying to upgrade to an encrypted DoH server operated by the user’s existing DNS provider.
images from Hacker News