Oblivious DNS - Simply Explained

Поділитися
Вставка
  • Опубліковано 20 гру 2020
  • Oblivious DNS is a privacy-friendly version of the DNS protocol. Preventing third-parties from keeping track of the sites you visit.
    It builds on top of DoH (DNS over HTTPS) and adds a proxy server to prevent tracking. It was developed by Cloudflare, Apple and Fastly.
    Currently, ODNS is not yet widely supported, but that could quickly change! Especially if Apple would push it to their iOS and macOS customers.
    🎶 Music
    "Lost Feelings" by Helena Decuyper:
    / project-34-1
    🌍 Social
    Twitter: / savjee
    Facebook: / savjee
    Blog: savjee.be
    💌 Newsletter: newsletter.savjee.be (no more than once a month)
    ❤️ Become a Simply Explained member:
    / @simplyexplained
    📚 Sources used to make this video:
    savjee.be/videos/simply-expla...
  • Наука та технологія

КОМЕНТАРІ • 44

  • @juliocesar-bz4on
    @juliocesar-bz4on 2 роки тому +3

    Hi! I´m from Brazil and I love technology. Great explanation. I´m newcomer here. You got a new subscribed.
    Congrats!

  • @ThorstenStaerk
    @ThorstenStaerk 3 роки тому +2

    Great how you make us understand! In my simple words - instead of trusting technology, with ODNS, you have to trust organization. You have to trust that the proxy and the ODNS server's org do not talk to each other.

  • @asjadmotara
    @asjadmotara 3 роки тому +6

    Amazing work. Simple, elegant and something new to learn that remain in memories forever because of your easy to understand explaination.

  • @ayushpratap4726
    @ayushpratap4726 3 роки тому +6

    Savee we missed you for so long !

    • @simplyexplained
      @simplyexplained  3 роки тому +2

      My last video was 2 weeks ago ;)

    • @ayushpratap4726
      @ayushpratap4726 3 роки тому +1

      @@simplyexplained oops ! My bad Yeah I saw that No SQL one ! Actually your content is highly anticipated that's why ;p

  • @zyansheep
    @zyansheep 3 роки тому +6

    Notice: ISPs can still do reverse DNS lookups on IP addresses you connect to. This is *not* a replacement for Tor.
    Also I'm kinda suspicious about these proxy servers. If the organization who runs the DNS resolver also runs the proxy server, they can still figure out who you are and what websites you visit.

    • @simplyexplained
      @simplyexplained  3 роки тому +2

      Yes, I did mention that both should be independently operated.
      Also: valid remark about the ISP's! They still see everything if they really want.

  • @mohamadrezapirayesh3811
    @mohamadrezapirayesh3811 2 роки тому

    Great job thanks !

  • @rajtiwari665
    @rajtiwari665 2 роки тому

    Well explained

  • @BloodnutXcom
    @BloodnutXcom 3 роки тому +1

    Dns is always a balancing act. On the one hand, you want yo have control over your own devices through your router by, for example, blackholing some domain. But on the other hand you don't want third parties snooping on your request.

  • @gamedit2999
    @gamedit2999 3 роки тому

    So if i ise this, my isp will not see the sites i visit? Or there is another ways that isp use to see my visit history?

  • @daniiln.9468
    @daniiln.9468 6 місяців тому

    Does VPN help to hide the user’s IP from the DNS resolver and therefore solve the problem of the user’s identity exposure?

  • @winwin-gw7rn
    @winwin-gw7rn 3 роки тому

    why don’t put chain proxy servers just like tor

  • @mich2k1
    @mich2k1 9 місяців тому

    Does this hide infos as SNI too?

  • @dAtramt
    @dAtramt 3 роки тому

    Haha. At 1:40 those Bitcoin bag emojis imply ISPs are selling browser our history history for Bitcoin.

  • @SochSumeet
    @SochSumeet 3 роки тому

    😎🤟

  • @ahmedelwan9129
    @ahmedelwan9129 3 роки тому

    what if the proxy and odns own by same company :D

    • @simplyexplained
      @simplyexplained  3 роки тому +3

      That's what I said at the end. The only way it works, is if these two are independent.

  • @ilsunnylo3562
    @ilsunnylo3562 3 роки тому +1

    So you are never safe.

  • @johnmarks3650
    @johnmarks3650 2 роки тому

    Terrible idea. So now if I want to exfiltrate data via a DNS tunnel I can encrypt the whole thing from end-to-end. I set my bot to use my proxy service and my my termination server. I have just bypassed a number of security tools and once it is past the proxy, you cannot even discover the source of the breach. Adversaries are going to have a hey-day with this. There are reasons the EU providers are banning Apple private relay, this is one of them. Second, who ever controls the termination server controls all. In the case of Apple private relay (Apple+Cloudflare) while they cannot see the origin IP, they still can set policy on what is being browsed, giving preferred partners quicker responses. I am not saying Apple will do this, but at some point an unscrupulous eventually entity will. Third, what happens when Governmental entities. what access to DNS queries/responses for a terrorist investigation, will this even survive or will it be legislated out of existence..

  • @happy91997
    @happy91997 3 роки тому

    What's the weird music, sounds like some ghost is screaming

  • @gsichtsgrabII
    @gsichtsgrabII 3 роки тому

    Would Blockchain solve this problem?

    • @joefox9875
      @joefox9875 3 роки тому +1

      Usually blockchain solutions are about connecting information, whereas I think if you want to be more private you want to be 'off the chain'

  • @quintaeco
    @quintaeco 3 роки тому

    to protect against the man in the middle by implementing DNSSec

  • @andreujuanc
    @andreujuanc 3 роки тому

    Not green anymore ;)

  • @gurufrom212
    @gurufrom212 3 роки тому +2

    First comment

  • @logangraham2956
    @logangraham2956 3 роки тому +1

    you forgot something....
    [your device] -> [ISP] -> [proxy server] -> [ISP] -> [ODNS] -> [ISP] -> [proxy server] -> [ISP] -> [your device]
    you notice something :) the ISP has access to all the data along the entire chain . so really it doesn't matter.

    • @zyansheep
      @zyansheep 3 роки тому +1

      The data going between proxy, odns and you isn't the issue (b.c. it's encrypted) the issue is that ISPs still know exactly what IP addresses you connect to. (Which they can then lookup the DNS address of using reverse DNS)

    • @logangraham2956
      @logangraham2956 3 роки тому

      @@zyansheep the data is still a problem . it might not be readable but it still exists
      if i was the isp
      id follow the data from your device to the proxy.
      then follow the data as it leaves the proxy to the dns.
      and then obtain a copy of the ip address as it leaves the dns to go back to the proxy.
      and then follow the data back to your device.
      i just obtain the ip address you will go to and your device...
      tell me again why this entire process was useful XD.

    • @zyansheep
      @zyansheep 3 роки тому +1

      @@logangraham2956 how would the ISP "follow the data"? The data is encrypted between the device, proxy, and dns server. The best they could do would be packet timing correlation which is incredibly difficult to pull off (and wouldn't tell them anything anyway unless they controlled the DNS server)
      Also I never said this process was useful, imo this just allows Cloudflare and Apple to spy on their users more. ISPs can get around this easily with reverse DNS lookups.

    • @logangraham2956
      @logangraham2956 3 роки тому

      @@zyansheep its encrypted but it still exists

    • @logangraham2956
      @logangraham2956 3 роки тому

      @@zyansheep your forgetting that it is their switch you go through to get to anything at all.
      do you not think they could see the packets encrypted or not.

  • @quintaeco
    @quintaeco 3 роки тому +1

    find a dns services that does not use any big tech services

  • @quintaeco
    @quintaeco 3 роки тому

    NEVER TRUST BIG TECH