101010.pl is one of the many independent Mastodon servers you can use to participate in the fediverse.
101010.pl czyli najstarszy polski serwer Mastodon. Posiadamy wpisy do 2048 znaków.

Server stats:

487
active users

#dnsoverhttps

0 posts0 participants0 posts today
Hacker News<p>Why not use DNS over HTTPS (DoH)?</p><p><a href="https://www.bsdhowto.ch/doh.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">bsdhowto.ch/doh.html</span><span class="invisible"></span></a></p><p><a href="https://mastodon.social/tags/HackerNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HackerNews</span></a> <a href="https://mastodon.social/tags/DNSoverHTTPS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DNSoverHTTPS</span></a> <a href="https://mastodon.social/tags/DoH" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DoH</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.social/tags/technews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>technews</span></a></p>
Mika<p>Bruh I'm still so confused about this - can any <a href="https://sakurajima.social/tags/networking" rel="nofollow noopener" target="_blank">#networking</a> people or anyone with <a href="https://sakurajima.social/tags/PiHole" rel="nofollow noopener" target="_blank">#PiHole</a>/<a href="https://sakurajima.social/tags/Pi-hole" rel="nofollow noopener" target="_blank">#Pi-hole</a><span> experience chime in and tell if my goal is privacy, and if I were to prioritise one, it'd be better privacy against my ISP, what should I use on my Pi-hole DNS server?<br><br>- </span><a href="https://sakurajima.social/tags/Unbound" rel="nofollow noopener" target="_blank">#Unbound</a><span> as a recursive DNS server<br>- Enable </span><a href="https://sakurajima.social/tags/DNS-Over-TLS" rel="nofollow noopener" target="_blank">#DNS-Over-TLS</a> (<a href="https://sakurajima.social/tags/DoT" rel="nofollow noopener" target="_blank">#DoT</a>) using Unbound and upstream DNS provider set to something like <a href="https://sakurajima.social/tags/Cloudflare" rel="nofollow noopener" target="_blank">#Cloudflare</a><span><br>- or Enable </span><a href="https://sakurajima.social/tags/DNS-Over-HTTPS" rel="nofollow noopener" target="_blank">#DNS-Over-HTTPS</a> (<a href="https://sakurajima.social/tags/DoH" rel="nofollow noopener" target="_blank">#DoH</a>) using <a href="https://sakurajima.social/tags/Cloudflared" rel="nofollow noopener" target="_blank">#Cloudflared</a><span><br><br>I initially thought you could have Pi-hole be all three but I don't think so, no?</span></p>
smeg<p>If any unethical network operator (or government) can disable DoH on clients with a simple DNS flag, then what problem does DoH solve?</p><p>It stops you from blocking ads on the DNS level. That's all it was ever supposed to solve.</p><p>Disable DoH. Reject DoH.</p><p><a href="https://assortedflotsam.com/tags/dns" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dns</span></a> <a href="https://assortedflotsam.com/tags/adblock" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>adblock</span></a> <a href="https://assortedflotsam.com/tags/pihole" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pihole</span></a> <a href="https://assortedflotsam.com/tags/networking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>networking</span></a> <a href="https://assortedflotsam.com/tags/doh" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>doh</span></a> <a href="https://assortedflotsam.com/tags/dnsoverhttps" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dnsoverhttps</span></a></p>
Mauricio Teixeira 🇺🇸🇧🇷<p>I wrote a very basic <a href="https://hachyderm.io/tags/Ansible" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ansible</span></a> playbook to help people set up <a href="https://hachyderm.io/tags/PiHole" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PiHole</span></a> with <a href="https://hachyderm.io/tags/DNSOverHTTPS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DNSOverHTTPS</span></a> (<a href="https://hachyderm.io/tags/DoH" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DoH</span></a>) directly installed on a Debian-based host (Raspberry Pi or small VM). It's available on my GitHub repo. I hope you find it useful! <a href="https://hachyderm.io/tags/HomeLab" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HomeLab</span></a> <a href="https://hachyderm.io/tags/SelfHosted" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SelfHosted</span></a><br><a href="https://github.com/badnetmask/miscelaneous/tree/main/ansible/pihole-doh" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/badnetmask/miscelan</span><span class="invisible">eous/tree/main/ansible/pihole-doh</span></a></p>
John Shaft<p>Bref, Mozilla a activé <a href="https://piaille.fr/tags/EncryptedClientHello" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EncryptedClientHello</span></a> dans <a href="https://piaille.fr/tags/Firefox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firefox</span></a> 118 , mais uniquement s'il est configuré pour utiliser <a href="https://piaille.fr/tags/DNSoverHTTPS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DNSoverHTTPS</span></a>.</p><p>Y en dans Chrome aussi, a priori avec les mêmes conditions pour en profiter (ça semblerait logique)</p><p><a href="https://www.nextinpact.com/article/72598/mozilla-deploie-encrypted-client-hello-pour-chiffrer-adresses-sites-visites" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">nextinpact.com/article/72598/m</span><span class="invisible">ozilla-deploie-encrypted-client-hello-pour-chiffrer-adresses-sites-visites</span></a></p>
John Shaft<p>J'ai testé 5 minutes Windows 11 dans une VM VirtualBox pour essayer de voir comment y configurer <a href="https://piaille.fr/tags/DNSoverHTTPS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DNSoverHTTPS</span></a> à l'échelle du système :<br>- Ça rame comme pas permis<br>- Impossible de d'améliorer ça (je pense que c'est la transparence qui fait ramer, mais faut une licence pour désactiver)<br>- Impossible de monter la résolution à plus de 1280×960 (licence toussa)<br>- Système en français, clavier en QWERTY, parce que<br>- Trouvé les paramètres DoH : marche pas, prend pas en compte les modifs</p><p>VM effacée</p>
Ilya-S-Zharskiy<p><a href="https://habrastorage.org/r/w1560/getpro/habr/upload_files/415/6f6/08c/4156f608c01de8e22eccf9bc1a0cb2bb.png" rel="nofollow noopener" target="_blank">habrastorage.org</a><br> <br> Обход блокировок: настройка сервера XRay для Shadowsocks-2022 и VLESS с XTLS-Vision, Websockets и фейковым веб-сайтом<br> <br> _habr.com/ru/articles/728836/ <a class="hashtag" href="https://juick.com/tag/dns2socks" rel="nofollow noopener" target="_blank">#dns2socks</a> <a class="hashtag" href="https://juick.com/tag/%D1%87%D0%B5%D0%B1%D1%83%D1%80%D0%BD%D0%B5%D1%82" rel="nofollow noopener" target="_blank">#чебурнет</a> <a class="hashtag" href="https://juick.com/tag/adguard" rel="nofollow noopener" target="_blank">#adguard</a> <a class="hashtag" href="https://juick.com/tag/Shadowsocks" rel="nofollow noopener" target="_blank">#Shadowsocks</a> <a class="hashtag" href="https://juick.com/tag/DNSCryptProxy2" rel="nofollow noopener" target="_blank">#DNSCryptProxy2</a> <a class="hashtag" href="https://juick.com/tag/%D1%80%D0%BE%D1%81%D0%BA%D0%BE%D0%BC%D0%BF%D0%BE%D0%B7%D0%BE%D1%80" rel="nofollow noopener" target="_blank">#роскомпозор</a> <a class="hashtag" href="https://juick.com/tag/ODoH" rel="nofollow noopener" target="_blank">#ODoH</a> <a class="hashtag" href="https://juick.com/tag/%D0%BE%D0%B1%D1%85%D0%BE%D0%B4_%D0%B1%D0%BB%D0%BE%D0%BA%D0%B8%D1%80%D0%BE%D0%B2%D0%BE%D0%BA" rel="nofollow noopener" target="_blank">#обход_блокировок</a> <a class="hashtag" href="https://juick.com/tag/docker" rel="nofollow noopener" target="_blank">#docker</a> <a class="hashtag" href="https://juick.com/tag/DNS-proxy" rel="nofollow noopener" target="_blank">#DNS-proxy</a> <a class="hashtag" href="https://juick.com/tag/DNSSEC" rel="nofollow noopener" target="_blank">#DNSSEC</a> <a class="hashtag" href="https://juick.com/tag/doh" rel="nofollow noopener" target="_blank">#doh</a> <a class="hashtag" href="https://juick.com/tag/unbound" rel="nofollow noopener" target="_blank">#unbound</a> <a class="hashtag" href="https://juick.com/tag/DoQ" rel="nofollow noopener" target="_blank">#DoQ</a> <a class="hashtag" href="https://juick.com/tag/privacy" rel="nofollow noopener" target="_blank">#privacy</a> <a class="hashtag" href="https://juick.com/tag/antiZapret" rel="nofollow noopener" target="_blank">#antiZapret</a> <a class="hashtag" href="https://juick.com/tag/DNS" rel="nofollow noopener" target="_blank">#DNS</a> <a class="hashtag" href="https://juick.com/tag/dnsleaktest" rel="nofollow noopener" target="_blank">#dnsleaktest</a> <a class="hashtag" href="https://juick.com/tag/%D0%A2%D0%A1%D0%9F%D0%A3" rel="nofollow noopener" target="_blank">#ТСПУ</a> <a class="hashtag" href="https://juick.com/tag/wireguard" rel="nofollow noopener" target="_blank">#wireguard</a> <a class="hashtag" href="https://juick.com/tag/%D1%81%D1%83%D0%B2%D0%B5%D1%80%D0%B5%D0%BD%D0%BD%D1%8B%D0%B9_%D1%80%D1%83%D0%BD%D0%B5%D1%82" rel="nofollow noopener" target="_blank">#суверенный_рунет</a> <a class="hashtag" href="https://juick.com/tag/DNSCrypt" rel="nofollow noopener" target="_blank">#DNSCrypt</a> <a class="hashtag" href="https://juick.com/tag/%D0%B1%D0%BB%D0%BE%D0%BA%D0%B8%D1%80%D0%BE%D0%B2%D0%BA%D0%B0_VPN" rel="nofollow noopener" target="_blank">#блокировка_VPN</a> <a class="hashtag" href="https://juick.com/tag/%D1%81%D1%83%D0%B2%D0%B5%D0%BD%D0%B8%D1%80%D0%BD%D1%8B%D0%B9_%D0%B8%D0%BD%D1%82%D0%B5%D1%80%D0%BD%D0%B5%D1%82" rel="nofollow noopener" target="_blank">#сувенирный_интернет</a> <a class="hashtag" href="https://juick.com/tag/%D0%90%D0%A1%D0%91%D0%98" rel="nofollow noopener" target="_blank">#АСБИ</a> <a class="hashtag" href="https://juick.com/tag/DNS-over-HTTPS" rel="nofollow noopener" target="_blank">#DNS-over-HTTPS</a></p>
heise online<p>Die schwierige Suche nach Quantencomputer-sicherer Kryptografie</p><p>Quantencomputer der nächsten Generation würden asymmetrische kryptografische Schlüssel schnell knacken. Das gefährdet auch das weltweite Domain Name System.</p><p><a href="https://www.heise.de/news/Die-schwierige-Suche-nach-Quantencomputer-sicherer-Kryptografie-7451979.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege" rel="nofollow noopener" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Die-schwierige-S</span><span class="invisible">uche-nach-Quantencomputer-sicherer-Kryptografie-7451979.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege</span></a> </p><p><a href="https://mastodon.social/tags/Algorithmen" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Algorithmen</span></a> <a href="https://mastodon.social/tags/DNS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DNS</span></a> <a href="https://mastodon.social/tags/DNSoverHTTPs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DNSoverHTTPs</span></a>(DoH) <a href="https://mastodon.social/tags/DNSSEC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DNSSEC</span></a> <a href="https://mastodon.social/tags/GitHub" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GitHub</span></a> <a href="https://mastodon.social/tags/Internetprotokolle" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Internetprotokolle</span></a> <a href="https://mastodon.social/tags/Quantencomputer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Quantencomputer</span></a> <a href="https://mastodon.social/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://mastodon.social/tags/Verschl%C3%BCsselung" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Verschlüsselung</span></a></p>
John Goerzen<p><span class="h-card"><a href="https://mastodon.social/@hermogenes" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>hermogenes</span></a></span> I pretty much agree with you, actually. I have used <a href="https://floss.social/tags/Firefox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firefox</span></a> for years and appreciated what goes into it, and of course their recommendation is still... Firefox, with changed settings.</p><p>That said, I've recently tried out <a href="https://floss.social/tags/LibreWolf" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LibreWolf</span></a>, itself a Firefox fork. And, wow. The privacy game is so much nicer out of the box; I need far fewer plugins and it's all just... working. Very, very impressed.</p><p>Re <a href="https://floss.social/tags/DNSoverHTTPS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DNSoverHTTPS</span></a> (<a href="https://floss.social/tags/DoH" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DoH</span></a>), I guess it's: who's your adversary? Sketchy wifi or CloudFlare?</p>
IT News<p>Slap This Big Red Button for an Instant Social Media Detox - Dangerous machines, like ones that can quickly reduce you to a fine red mist or a ... - <a href="https://hackaday.com/2022/09/30/slap-this-big-red-button-for-an-instant-social-media-detox/" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2022/09/30/slap-t</span><span class="invisible">his-big-red-button-for-an-instant-social-media-detox/</span></a> <a href="https://schleuss.online/tags/internethacks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>internethacks</span></a> <a href="https://schleuss.online/tags/dnsoverhttps" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dnsoverhttps</span></a> <a href="https://schleuss.online/tags/socialmedia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>socialmedia</span></a> <a href="https://schleuss.online/tags/blocker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blocker</span></a> <a href="https://schleuss.online/tags/wemosd1" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wemosd1</span></a> <a href="https://schleuss.online/tags/detox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>detox</span></a> <a href="https://schleuss.online/tags/doh" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>doh</span></a> <a href="https://schleuss.online/tags/iot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iot</span></a> <a href="https://schleuss.online/tags/spi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>spi</span></a> <a href="https://schleuss.online/tags/vpn" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vpn</span></a></p>
heise online (inoffiziell)Netzwerkgeräte verschlüsseln ihre DNS-Anfragen oft nicht, was ein Loch in den Privatsphärenschutz reißt. Mit passenden Gegenmaßnahmen lässt es sich stopfen. <br><a href="https://www.heise.de/ratgeber/FAQ-Verschluesselte-DNS-Anfragen-6207567.html" rel="nofollow noopener" target="_blank">FAQ: Verschlüsselte DNS-Anfragen</a><br>
heise online (inoffiziell)Das Internet Systems Consortium (ISC) integriert DNS over HTTPS in seinen DNS-Client dig. Eine Entwicklerversion steht für Tests bereits zur Verfügung.<br> <a href="https://www.heise.de/news/DNS-Client-dig-lernt-DNS-over-HTTPS-5994375.html" rel="nofollow noopener" target="_blank">DNS-Client dig lernt DNS over HTTPS</a>
heise online (inoffiziell)DoH besorgt manche Experten. Oblivious DNS over HTTPS (ODoH) soll es jetzt richten. Cloudflare und Apple wollen Hostnamen und IP entkoppeln.<br> <a href="https://www.heise.de/news/Cloudflare-veroeffentlicht-neue-Protokolle-fuer-mehr-Privatsphaere-4984831.html" rel="nofollow noopener" target="_blank">Cloudflare veröffentlicht neue Protokolle für mehr Privatsphäre</a>
Sheogorath :si_blobfox:<p>Nice, so I have DoH and DoT running!</p><p>DoT is sadly not fully configured on the client side yet due to missing SNI headers that is caused by NetworkManager and systemd-resolved. But I work on that one:</p><p><a href="https://gitlab.freedesktop.org/NetworkManager/NetworkManager/-/issues/528" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">gitlab.freedesktop.org/Network</span><span class="invisible">Manager/NetworkManager/-/issues/528</span></a></p><p><a href="https://microblog.shivering-isles.com/tags/DNS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DNS</span></a> <a href="https://microblog.shivering-isles.com/tags/DNSoverHTTPS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DNSoverHTTPS</span></a> <a href="https://microblog.shivering-isles.com/tags/DNSoverTLS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DNSoverTLS</span></a></p>
Frédéric Véron :mastodon:<p>[<a href="https://framapiaf.org/tags/BotActu" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BotActu</span></a>] « Comcast’s Xfinity Internet Service Joins Firefox’s Trusted Recursive Resolver Program » <a href="https://blog.mozilla.org/blog/2020/06/25/comcasts-xfinity-internet-service-joins-firefoxs-trusted-recursive-resolver-program/" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.mozilla.org/blog/2020/06/</span><span class="invisible">25/comcasts-xfinity-internet-service-joins-firefoxs-trusted-recursive-resolver-program/</span></a> <a href="https://framapiaf.org/tags/TrustedRecursiveResolver" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TrustedRecursiveResolver</span></a>(TRR) <a href="https://framapiaf.org/tags/InternetServiceProvider" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InternetServiceProvider</span></a>(ISP) <a href="https://framapiaf.org/tags/PressReleases" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PressReleases</span></a> <a href="https://framapiaf.org/tags/DNSoverHTTPS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DNSoverHTTPS</span></a> <a href="https://framapiaf.org/tags/MozillaNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MozillaNews</span></a> <a href="https://framapiaf.org/tags/Statement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Statement</span></a> <a href="https://framapiaf.org/tags/Firefox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firefox</span></a> <a href="https://framapiaf.org/tags/Privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Privacy</span></a> <a href="https://framapiaf.org/tags/DoH" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DoH</span></a></p>
Minoru<p>I'll just hold off adopting <a href="https://functional.cafe/tags/DNSoverHTTPS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DNSoverHTTPS</span></a> for now.</p>
Minoru<p><a href="https://functional.cafe/tags/OpenDNS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenDNS</span></a> <a href="https://functional.cafe/tags/DOH" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DOH</span></a> (doh.opendns.com) is weird:</p><ul><li>returns IPs from a different country, whereas dns.opendns.com returns the closest IP possible;</li><li>traceroute can't reach it even with a hundred hops. The first 10 or so hops are the same as with dns.opendns.com, but then it seems to disappear into some abyss.</li></ul><p>Google and CloudFlare don't have these problems, so if I want <a href="https://functional.cafe/tags/DNSoverHTTPS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DNSoverHTTPS</span></a>, I have to decide between these two. 🤔 (NextDNS is not an option because I don't need filtering and don't want to register an account with them.)</p>
Teddy / Domingo (🇨🇵/🇬🇧)<p>🇨🇵 <a href="https://framapiaf.org/tags/dnsoverhttps" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dnsoverhttps</span></a> ( <a href="https://framapiaf.org/tags/DoH" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DoH</span></a>) arrive dans <a href="https://framapiaf.org/tags/windows10" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>windows10</span></a> : comment ça marche ? <br><a href="https://www.nextinpact.com/news/107261-dns-over-https-doh-arrive-dans-windows-10-comment-ca-marche.htm" rel="nofollow noopener" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">nextinpact.com/news/107261-dns</span><span class="invisible">-over-https-doh-arrive-dans-windows-10-comment-ca-marche.htm</span></a></p><p>🇬🇧 <a href="https://framapiaf.org/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> adds initial support for <a href="https://framapiaf.org/tags/dnsoverhttps" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dnsoverhttps</span></a> ( <a href="https://framapiaf.org/tags/DoH" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DoH</span></a>) in <a href="https://framapiaf.org/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> Insiders.<br><a href="https://www.zdnet.com/article/microsoft-adds-initial-support-for-dns-over-https-doh-in-windows-insiders/#ftag=RSSbaffb68" rel="nofollow noopener" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">zdnet.com/article/microsoft-ad</span><span class="invisible">ds-initial-support-for-dns-over-https-doh-in-windows-insiders/#ftag=RSSbaffb68</span></a></p>
Fla<p>A <a href="https://mastodon.social/tags/firefox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firefox</span></a> tip to avoid <a href="https://mastodon.social/tags/github" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>github</span></a> and other <a href="https://mastodon.social/tags/DNSCensorship" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DNSCensorship</span></a> currently going on in <a href="https://mastodon.social/tags/Spain" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Spain</span></a></p><p><a href="https://diaspora-fr.org/posts/4627397" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="">diaspora-fr.org/posts/4627397</span><span class="invisible"></span></a></p><p> (What? An EU country censoring github? Are they going crazy? Oô)</p><p><a href="https://mastodon.social/tags/doh" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>doh</span></a> <a href="https://mastodon.social/tags/dnsoverhttps" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dnsoverhttps</span></a> cc <span class="h-card"><a href="https://mastodon.gougere.fr/@bortzmeyer" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>bortzmeyer</span></a></span> tu es probablement au jus de ce qui se passe là-bas mais bon.</p>
Sheogorath :si_blobfox:<p>[Repost due to dead URL]</p><p>There was recently a lot of news about DNS over HTTPS. Some people say it's bad for privacy because it centralizes the DNS requests on Google, Cloudflare and Quad9.</p><p>Time to change that and run your own DNS over HTTPS server. I spend some time today in writing, documenting and arranging a small container setup to allow you to do this:</p><p><a href="https://git.shivering-isles.com/container-library/dns-over-https" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">git.shivering-isles.com/contai</span><span class="invisible">ner-library/dns-over-https</span></a></p><p><a href="https://microblog.shivering-isles.com/tags/DNSoverHTTPS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DNSoverHTTPS</span></a> <a href="https://microblog.shivering-isles.com/tags/DoH" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DoH</span></a> <a href="https://microblog.shivering-isles.com/tags/Docker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Docker</span></a> <a href="https://microblog.shivering-isles.com/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://microblog.shivering-isles.com/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://microblog.shivering-isles.com/tags/selfHosting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>selfHosting</span></a> <a href="https://microblog.shivering-isles.com/tags/DNS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DNS</span></a></p>