Oblivious DNS - Simply Explained

Поделиться
HTML-код
  • Опубликовано: 20 дек 2020
  • Oblivious DNS is a privacy-friendly version of the DNS protocol. Preventing third-parties from keeping track of the sites you visit.
    It builds on top of DoH (DNS over HTTPS) and adds a proxy server to prevent tracking. It was developed by Cloudflare, Apple and Fastly.
    Currently, ODNS is not yet widely supported, but that could quickly change! Especially if Apple would push it to their iOS and macOS customers.
    🎶 Music
    "Lost Feelings" by Helena Decuyper:
    / project-34-1
    🌍 Social
    Twitter: / savjee
    Facebook: / savjee
    Blog: savjee.be
    💌 Newsletter: newsletter.savjee.be (no more than once a month)
    ❤️ Become a Simply Explained member:
    / @simplyexplained
    📚 Sources used to make this video:
    savjee.be/videos/simply-expla...
  • НаукаНаука

Комментарии • 44

  • @juliocesar-bz4on
    @juliocesar-bz4on 2 года назад +3

    Hi! I´m from Brazil and I love technology. Great explanation. I´m newcomer here. You got a new subscribed.
    Congrats!

  • @asjadmotara
    @asjadmotara 3 года назад +6

    Amazing work. Simple, elegant and something new to learn that remain in memories forever because of your easy to understand explaination.

  • @ThorstenStaerk
    @ThorstenStaerk 3 года назад +2

    Great how you make us understand! In my simple words - instead of trusting technology, with ODNS, you have to trust organization. You have to trust that the proxy and the ODNS server's org do not talk to each other.

  • @ayushpratap4726
    @ayushpratap4726 3 года назад +6

    Savee we missed you for so long !

    • @simplyexplained
      @simplyexplained  3 года назад +2

      My last video was 2 weeks ago ;)

    • @ayushpratap4726
      @ayushpratap4726 3 года назад +1

      @@simplyexplained oops ! My bad Yeah I saw that No SQL one ! Actually your content is highly anticipated that's why ;p

  • @zyansheep
    @zyansheep 3 года назад +6

    Notice: ISPs can still do reverse DNS lookups on IP addresses you connect to. This is *not* a replacement for Tor.
    Also I'm kinda suspicious about these proxy servers. If the organization who runs the DNS resolver also runs the proxy server, they can still figure out who you are and what websites you visit.

    • @simplyexplained
      @simplyexplained  3 года назад +2

      Yes, I did mention that both should be independently operated.
      Also: valid remark about the ISP's! They still see everything if they really want.

  • @mohamadrezapirayesh3811
    @mohamadrezapirayesh3811 2 года назад

    Great job thanks !

  • @gamedit2999
    @gamedit2999 3 года назад

    So if i ise this, my isp will not see the sites i visit? Or there is another ways that isp use to see my visit history?

  • @BloodnutXcom
    @BloodnutXcom 3 года назад +1

    Dns is always a balancing act. On the one hand, you want yo have control over your own devices through your router by, for example, blackholing some domain. But on the other hand you don't want third parties snooping on your request.

  • @rajtiwari665
    @rajtiwari665 2 года назад

    Well explained

  • @daniiln.9468
    @daniiln.9468 6 месяцев назад

    Does VPN help to hide the user’s IP from the DNS resolver and therefore solve the problem of the user’s identity exposure?

  • @winwin-gw7rn
    @winwin-gw7rn 3 года назад

    why don’t put chain proxy servers just like tor

  • @mich2k1
    @mich2k1 10 месяцев назад

    Does this hide infos as SNI too?

  • @dAtramt
    @dAtramt 3 года назад

    Haha. At 1:40 those Bitcoin bag emojis imply ISPs are selling browser our history history for Bitcoin.

  • @ilsunnylo3562
    @ilsunnylo3562 3 года назад +1

    So you are never safe.

  • @ahmedelwan9129
    @ahmedelwan9129 3 года назад

    what if the proxy and odns own by same company :D

    • @simplyexplained
      @simplyexplained  3 года назад +3

      That's what I said at the end. The only way it works, is if these two are independent.

  • @quintaeco
    @quintaeco 3 года назад

    to protect against the man in the middle by implementing DNSSec

  • @happy91997
    @happy91997 3 года назад

    What's the weird music, sounds like some ghost is screaming

  • @johnmarks3650
    @johnmarks3650 2 года назад

    Terrible idea. So now if I want to exfiltrate data via a DNS tunnel I can encrypt the whole thing from end-to-end. I set my bot to use my proxy service and my my termination server. I have just bypassed a number of security tools and once it is past the proxy, you cannot even discover the source of the breach. Adversaries are going to have a hey-day with this. There are reasons the EU providers are banning Apple private relay, this is one of them. Second, who ever controls the termination server controls all. In the case of Apple private relay (Apple+Cloudflare) while they cannot see the origin IP, they still can set policy on what is being browsed, giving preferred partners quicker responses. I am not saying Apple will do this, but at some point an unscrupulous eventually entity will. Third, what happens when Governmental entities. what access to DNS queries/responses for a terrorist investigation, will this even survive or will it be legislated out of existence..

  • @gsichtsgrabII
    @gsichtsgrabII 3 года назад

    Would Blockchain solve this problem?

    • @joefox9875
      @joefox9875 3 года назад +1

      Usually blockchain solutions are about connecting information, whereas I think if you want to be more private you want to be 'off the chain'

  • @andreujuanc
    @andreujuanc 3 года назад

    Not green anymore ;)

  • @SochSumeet
    @SochSumeet 3 года назад

    😎🤟

  • @gurufrom212
    @gurufrom212 3 года назад +2

    First comment

  • @logangraham2956
    @logangraham2956 3 года назад +1

    you forgot something....
    [your device] -> [ISP] -> [proxy server] -> [ISP] -> [ODNS] -> [ISP] -> [proxy server] -> [ISP] -> [your device]
    you notice something :) the ISP has access to all the data along the entire chain . so really it doesn't matter.

    • @zyansheep
      @zyansheep 3 года назад +1

      The data going between proxy, odns and you isn't the issue (b.c. it's encrypted) the issue is that ISPs still know exactly what IP addresses you connect to. (Which they can then lookup the DNS address of using reverse DNS)

    • @logangraham2956
      @logangraham2956 3 года назад

      @@zyansheep the data is still a problem . it might not be readable but it still exists
      if i was the isp
      id follow the data from your device to the proxy.
      then follow the data as it leaves the proxy to the dns.
      and then obtain a copy of the ip address as it leaves the dns to go back to the proxy.
      and then follow the data back to your device.
      i just obtain the ip address you will go to and your device...
      tell me again why this entire process was useful XD.

    • @zyansheep
      @zyansheep 3 года назад +1

      @@logangraham2956 how would the ISP "follow the data"? The data is encrypted between the device, proxy, and dns server. The best they could do would be packet timing correlation which is incredibly difficult to pull off (and wouldn't tell them anything anyway unless they controlled the DNS server)
      Also I never said this process was useful, imo this just allows Cloudflare and Apple to spy on their users more. ISPs can get around this easily with reverse DNS lookups.

    • @logangraham2956
      @logangraham2956 3 года назад

      @@zyansheep its encrypted but it still exists

    • @logangraham2956
      @logangraham2956 3 года назад

      @@zyansheep your forgetting that it is their switch you go through to get to anything at all.
      do you not think they could see the packets encrypted or not.

  • @quintaeco
    @quintaeco 3 года назад +1

    find a dns services that does not use any big tech services

  • @quintaeco
    @quintaeco 3 года назад

    NEVER TRUST BIG TECH