by timw6n on 1/13/14, 12:07 AM with 38 comments
by navyrain on 1/13/14, 1:28 AM
This hijacking (I am blanking on the technical term for it) really rubs me the wrong way. Is there a way to get around it?
by dmunoz on 1/13/14, 1:26 AM
I point this out mainly because I gave dnscrypt a shot more than a year ago on windows and it severely borked my internet in a non-obvious way which had nothing to do with DNS. For days I was limited to ~25kbps speeds. I had disable dnscrypt at this point, and was on the verge of phoning my ISP to report a problem when I finally fully removed the windows client and the problem resolved itself. Playing with preview release software can seriously suck sometimes.
by crator on 1/13/14, 3:26 AM
The attackers already do it for so-called copyright infringement, but they could do it for any reason, if they wanted to. So, what about thoroughly decentralizing the DNS system and getting rid of the centralization of corruption at ICANN? Isn't that more urgent nowadays?
by xxdesmus on 1/13/14, 1:24 AM
by mike-cardwell on 1/13/14, 10:47 AM
Your ISP doesn't need to see your DNS queries in order to know what sites you're visiting. They can see the IP's that you're sending packets to. They can see the HTTP "Host" header for HTTP. They can even see the hostname for HTTPS because of SNI.
by gararapa on 1/13/14, 1:41 AM
by zaroth on 1/13/14, 1:20 AM
Perhaps this is an easy way to achieve that for DNS at least. Not sure how many other protocols are necessary to tunnel from a server which is only responding to HTTPS, and installing security updates.
by Nux on 1/13/14, 7:42 AM