Thus said Michael Torrie on Mon, 09 Sep 2019 15:04:09 -0600:

> As many  of you know recent  releases of Firefox have  implemented DNS
> over HTTPS (their  own idea as opposed to the  standard DNS over TLS),
> which bypasses your local DNS and  uses cloudfare's DNS server on port
> 443.

I was not aware of this unprecedented and disastrous behavior, thank you
for sharing---it  reminds me of  how Verisign  wanted to hijack  [1] all
unregistered domains with  wildcards and redirect to  their own servers.
It almost makes me want to implement whitelisting for domains...

I  already have  a large  selection  of domains  that I  block but  it's
getting increasingly more  difficult to keep track of  all such "canary"
domains.

[1] https://www.dslreports.com/shownews/33050

Thanks,

Andy
-- 
TAI64 timestamp: 400000005d7701cb



/*
PLUG: http://plug.org, #utah on irc.freenode.net
Unsubscribe: http://plug.org/mailman/options/plug
Don't fear the penguin.
*/

Reply via email to