From b5a86372c27239794886067500292e87be5845a0 Mon Sep 17 00:00:00 2001 From: curben Date: Sat, 25 May 2019 17:26:20 +0930 Subject: [PATCH] fix: add DoH tag --- source/_posts/doh-tls-privacy.md | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/source/_posts/doh-tls-privacy.md b/source/_posts/doh-tls-privacy.md index 6c675ac..a9e16c8 100644 --- a/source/_posts/doh-tls-privacy.md +++ b/source/_posts/doh-tls-privacy.md @@ -4,6 +4,7 @@ date: 2019-04-04 tags: - Privacy - Security +- DoH --- Recently I stumbled upon this [bug report](https://lists.zx2c4.com/pipermail/wireguard/2019-February/003902.html), and as a side note, the reporter wants to use DNS-over-TLS (DoT) for privacy reasons; to prevent the ISP from knowing visited website. It turns out many also believe this after a brief search for news articles on DoT or DNS-over-HTTPS (DoH). Actually, DoT/DoH does not completely eliminate ISP surveillance. Here's why, @@ -34,4 +35,4 @@ Android getting "DNS over TLS" support to stop ISPs from knowing what websites y -***TL;DR*** DoT/DoH doesn't hide your destination IPs. Use Tor/VPN for that. \ No newline at end of file +***TL;DR*** DoT/DoH doesn't hide your destination IPs. Use Tor/VPN for that.