Home / News

Firefox Starts the Roll Out of DNS Over HTTPS (DoH) by Default for US-Based Users

Firefox begins the rollout of encrypted DNS over HTTPS (DoH) by default for its US-based users. According to the company, the rollout will continue over the next few weeks to confirm that no major issues are discovered as this new protocol is enabled. “[U]nencrypted DNS is not only vulnerable to spying but is being exploited, and so we are helping the internet to make the shift to more secure alternatives,” says Mozilla, the non-profit parent organization.

How it’s done, Firefox explains: “We do this by performing DNS lookups in an encrypted HTTPS connection. This helps hide your browsing history from attackers on the network, helps prevent data collection by third parties on the network that ties your computer to websites you visit.” (Mozilla)

The controversy: “Some internet engineers warn that DoH is a threat not just to people’s privacy, but the stability of the Internet itself. And they have been met with counterclaims that they are out of touch and don’t grasp how the Internet actually works in 2019.” (CircleID)

NORDVPN DISCOUNT - CircleID x NordVPN
Get NordVPN  [74% +3 extra months, from $2.99/month]
By CircleID Reporter

CircleID’s internal staff reporting on news tips and developing stories. Do you have information the professional Internet community should be aware of? Contact us.

Visit Page

Filed Under

Comments

Where will the DoH connection(s) be made Phil Howard  –  Mar 6, 2020 1:40 AM

Where will the DoH connection(s) be made to, by default?  Will it be easy to change in preferences or will we need to struggle with about:config?  Can we use multiple DoH servers?  How can I run my own DoH server?  Will there be an RFC for the protocol?  Will dig be taught how to use DoH?  Will there be example free open source software clients and servers released to demonstrate and locally test the protocol?

Comment Title:

  Notify me of follow-up comments

We encourage you to post comments and engage in discussions that advance this post through relevant opinion, anecdotes, links and data. If you see a comment that you believe is irrelevant or inappropriate, you can report it using the link at the end of each comment. Views expressed in the comments do not represent those of CircleID. For more information on our comment policy, see Codes of Conduct.

CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

Related

Topics

Threat Intelligence

Sponsored byWhoisXML API

IPv4 Markets

Sponsored byIPv4.Global

Brand Protection

Sponsored byCSC

Domain Names

Sponsored byVerisign

Cybersecurity

Sponsored byVerisign

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com