{"id":19557,"date":"2018-11-20T11:00:00","date_gmt":"2018-11-20T11:00:00","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/dns-over-https-seeks-to-make-internet-use-more-private\/"},"modified":"2018-11-20T11:00:00","modified_gmt":"2018-11-20T11:00:00","slug":"dns-over-https-seeks-to-make-internet-use-more-private","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/dns-over-https-seeks-to-make-internet-use-more-private\/","title":{"rendered":"DNS over HTTPS seeks to make internet use more private"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2018\/10\/spinning-globe_smart-city_iot_skyscrapers_city-scape_internet_digital-transformation-100777501-large.3x2.jpg\" class=\"ff-og-image-inserted\"\/><\/div>\n<p>Unauthorized interception of <a href=\"https:\/\/www.networkworld.com\/article\/3268449\/internet\/what-is-dns-and-how-does-it-work.html\">DNS<\/a> traffic provides enough information to ascertain internet users\u2019 thoughts, desires, hopes and dreams.\u00a0 Not only is there concern for privacy from nearby nosey neighbors, but governments and corporations could use that information to learn about individuals\u2019 internet behavior and use it to profile them and their organization for political purposes or target them with ads.\u00a0<\/p>\n<p>Efforts like the <a href=\"https:\/\/dnsprivacy.org\/wiki\/\">DNS Privacy Project<\/a> aim to raise awareness of this issue and provide pointers to resources to help mitigate these threats.<\/p>\n<aside class=\"fakesidebar\"><strong>[ Now read <a href=\"https:\/\/www.networkworld.com\/article\/3276025\/careers\/20-hot-jobs-ambitious-it-pros-should-shoot-for.html\">20 hot jobs ambitious IT pros should shoot for<\/a>. ]<\/strong><\/aside>\n<p>The IETF has been working on the problem as well. It formed the <a href=\"https:\/\/datatracker.ietf.org\/wg\/dprive\/about\/\">DNS PRIVate Exchange<\/a> (DPRIVE) working group to define the problems and evaluate options to mitigate the security threats.\u00a0 One of its major efforts has been to create methods whereby <a href=\"https:\/\/datatracker.ietf.org\/wg\/doh\/about\/\">DNS can be used over HTTP<\/a> (DOH).\u00a0 Even though DNS queries could take place over HTTP in the clear, that wouldn\u2019t solve the unencrypted privacy issue.\u00a0 Therefore, the protocol development has been on <a href=\"https:\/\/tools.ietf.org\/html\/draft-ietf-doh-dns-over-https-14\">DNS Queries over HTTPS<\/a> (also referred to as DOH), which was standardized in October 2018.<\/p>\n<p>(While this article addresses DNS over HTTPS, the IETF\u2019s primary published proposed standard for securing DNS traffic is \u201cSpecification for DNS over Transport Layer Security (TLS)\u201d (DOT) (<a href=\"https:\/\/tools.ietf.org\/html\/rfc7858\">RFC 7858<\/a>).\u00a0 Since DNS traffic uses UDP messages, the IETF also published \u201cDNS over Datagram Transport Layer Security (DTLS)\u201d (<a href=\"https:\/\/tools.ietf.org\/html\/rfc8094\">RFC 8094<\/a>).\u00a0 The <a href=\"https:\/\/datatracker.ietf.org\/wg\/dprive\/about\/\">IETF DPRIVE working group<\/a> has also published \u201cUsage Profiles for DNS over TLS and DNS over DTLS\u201d (<a href=\"https:\/\/tools.ietf.org\/html\/rfc8310\">RFC 8310<\/a>).)<\/p>\n<h2>How DNS over HTTPS works<\/h2>\n<p>DOH uses a direct connection between the end-user and the web server\u2019s interface.\u00a0 Since the DNS query and response are taking place over a web-based HTTP interface, the DNS response format uses <a href=\"https:\/\/en.wikipedia.org\/wiki\/JSON\">JSON notation<\/a>.\u00a0 This is different than the traditional DNS query and resource record format and lends itself to simpler integration with web-based applications.<\/p>\n<p>DOH could be implemented as a local proxy service running on the end-user\u2019s computer that is listening for DNS queries using TCP or UDP port 53.\u00a0 This local proxy service converts the DNS queries into an HTTPS connection to the DOH service.\u00a0 In the case of DNS over HTTPS, the connection is made using TCP port 443.\u00a0 (When DNS over TLS is used, then TCP port 853 is employed.)<\/p>\n<p>DOH can also be implemented in the user\u2019s web browser.\u00a0 When the browser makes a connection to a new URL, it connects to the pre-configured DOH service using TCP 853 and retrieves the JSON response containing the resulting IP address.<\/p>\n<p>DOH is of significant interest to content providers because they want to help preserve the privacy of their user and subscriber populations.\u00a0 Content providers desire greater control over DNS for their clients, guaranteeing that their clients are provided accurate information about IP addresses, mitigating <a href=\"https:\/\/en.wikipedia.org\/wiki\/Man-in-the-middle_attack\">man in the middle attacks<\/a>, and provide a faster service regardless of the client\u2019s operating system or location.<\/p>\n<p>The terms DNS over HTTP (DOH), DNS over HTTPS (DOH), and DNS over TLS (DOT) are often used interchangeably, but it is important to distinguish among HTTP, HTTPS, and TLS underlying this web-based DNS function.<\/p>\n<p>While DOH can make contribute to internet privacy, it\u2019s also important to recognize there are other ways to address the problem.<\/p>\n<h2>DOH alternatives<\/h2>\n<p>In the interest of completeness, there are also other methods that have been proposed and are in use that function like DOH.\u00a0 For example, DNS over HTTP can also use <a href=\"https:\/\/en.wikipedia.org\/wiki\/HTTP\/2\">HTTP\/2<\/a>.\u00a0 HTTP\/2 is an optimized version of HTTP that allows for multiplexed streams for simultaneous fetches, request prioritization, header compression and server push.\u00a0 In this case, the web resolver could use the <a href=\"https:\/\/httpwg.org\/specs\/rfc7540.html#PushResources\">HTTP\/2 Server Push<\/a> method to send\/push DNS updates to the client.\u00a0 This could be used to proactively notify clients that an update has occurred.\u00a0 This could be a more immediate method than the historical approach of waiting for the DNS record\u2019s TTL to expire.\u00a0<\/p>\n<p>DNS can also work over the <a href=\"https:\/\/en.wikipedia.org\/wiki\/QUIC\">QUIC protocol<\/a>.\u00a0 Quick UDP Internet Connections (QUIC) is an optimized transport layer protocol that provides the reliability of TCP with multiplexed connections and performance optimizations.\u00a0 Although this is currently and <a href=\"https:\/\/tools.ietf.org\/html\/draft-huitema-quic-dnsoquic-05\">IETF draft<\/a>, there is interest in ways to leverage the QUIC protocol because of its performance improvements for web servers.<\/p>\n<p>There are also other non-IETF methods for providing encryption of DNS queries.\u00a0 <a href=\"https:\/\/en.wikipedia.org\/wiki\/DNSCrypt\">DNSCrypt<\/a> is a method of using encryption to secure traditional DNS messages between an end-user and a resolver.\u00a0 <a href=\"https:\/\/dnscrypt.info\/\">DNSCrypt<\/a> can support TCP or UDP DNS messages over TCP port 443.\u00a0 The current <a href=\"https:\/\/github.com\/DNSCrypt\/dnscrypt-protocol\/blob\/master\/DNSCRYPT-V2-PROTOCOL.txt\">version 2 of the DNSCrypt protocol specification<\/a> is documented publicly.\u00a0 <a href=\"https:\/\/en.wikipedia.org\/wiki\/DNSCurve\">DNSCurve<\/a> is a similar method, but it uses elliptic curve cryptography with the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Curve25519\">Curve25519<\/a> (X25519 algorithm) for securing DNS.\u00a0 <a href=\"http:\/\/dnscurve.org\/\">DNSCurve<\/a> has been being developed since 2009.<\/p>\n<h2>Implementations of DOH<\/h2>\n<p>Momentum is building for DOH solutions and now there are implementation examples proving that these methods work.\u00a0 This list of <a href=\"https:\/\/github.com\/curl\/curl\/wiki\/DNS-over-HTTPS#publicly-available-servers\">publicly-available DOH servers<\/a> provides links to those services and the <a href=\"https:\/\/dnsprivacy.org\/wiki\/display\/DP\/DNS+Privacy+Test+Servers\">DNS Privacy Project<\/a><\/p>\n<p> READ MORE <a href=\"https:\/\/www.networkworld.com\/article\/3322023\/internet\/dns-over-https-seeks-to-make-internet-use-more-private.html#tk.rss_security\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\nUnauthorized interception of DNS traffic provides enough information to ascertain internet users\u2019 thoughts, desires, hopes and dreams.\u00a0 Not only is there concern for privacy from nearby nosey neighbors, but governments and corporations could use that information to learn about individuals\u2019 internet behavior and use it to profile them and their organization for political purposes or target them with ads.\u00a0Efforts like the DNS Privacy Project aim to raise awareness of this issue and provide pointers to resources to help mitigate these threats.To read this article in full, please click here(Insider Story) READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":19558,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[738],"tags":[740,1347,762,307],"class_list":["post-19557","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networkworld","tag-idg-insider","tag-internet","tag-networking","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>DNS over HTTPS seeks to make internet use more private 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/dns-over-https-seeks-to-make-internet-use-more-private\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DNS over HTTPS seeks to make internet use more private 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/dns-over-https-seeks-to-make-internet-use-more-private\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-11-20T11:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/11\/dns-over-https-seeks-to-make-internet-use-more-private.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"700\" \/>\n\t<meta property=\"og:image:height\" content=\"467\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/dns-over-https-seeks-to-make-internet-use-more-private\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/dns-over-https-seeks-to-make-internet-use-more-private\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"DNS over HTTPS seeks to make internet use more private\",\"datePublished\":\"2018-11-20T11:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/dns-over-https-seeks-to-make-internet-use-more-private\\\/\"},\"wordCount\":828,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/dns-over-https-seeks-to-make-internet-use-more-private\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/dns-over-https-seeks-to-make-internet-use-more-private.jpg\",\"keywords\":[\"IDG Insider\",\"Internet\",\"Networking\",\"Security\"],\"articleSection\":[\"Networkworld\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/dns-over-https-seeks-to-make-internet-use-more-private\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/dns-over-https-seeks-to-make-internet-use-more-private\\\/\",\"name\":\"DNS over HTTPS seeks to make internet use more private 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/dns-over-https-seeks-to-make-internet-use-more-private\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/dns-over-https-seeks-to-make-internet-use-more-private\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/dns-over-https-seeks-to-make-internet-use-more-private.jpg\",\"datePublished\":\"2018-11-20T11:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/dns-over-https-seeks-to-make-internet-use-more-private\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/dns-over-https-seeks-to-make-internet-use-more-private\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/dns-over-https-seeks-to-make-internet-use-more-private\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/dns-over-https-seeks-to-make-internet-use-more-private.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/dns-over-https-seeks-to-make-internet-use-more-private.jpg\",\"width\":700,\"height\":467},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/dns-over-https-seeks-to-make-internet-use-more-private\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IDG Insider\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/idg-insider\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"DNS over HTTPS seeks to make internet use more private\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DNS over HTTPS seeks to make internet use more private 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/dns-over-https-seeks-to-make-internet-use-more-private\/","og_locale":"en_US","og_type":"article","og_title":"DNS over HTTPS seeks to make internet use more private 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/dns-over-https-seeks-to-make-internet-use-more-private\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-11-20T11:00:00+00:00","og_image":[{"width":700,"height":467,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/11\/dns-over-https-seeks-to-make-internet-use-more-private.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/dns-over-https-seeks-to-make-internet-use-more-private\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/dns-over-https-seeks-to-make-internet-use-more-private\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"DNS over HTTPS seeks to make internet use more private","datePublished":"2018-11-20T11:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/dns-over-https-seeks-to-make-internet-use-more-private\/"},"wordCount":828,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/dns-over-https-seeks-to-make-internet-use-more-private\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/11\/dns-over-https-seeks-to-make-internet-use-more-private.jpg","keywords":["IDG Insider","Internet","Networking","Security"],"articleSection":["Networkworld"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/dns-over-https-seeks-to-make-internet-use-more-private\/","url":"https:\/\/www.threatshub.org\/blog\/dns-over-https-seeks-to-make-internet-use-more-private\/","name":"DNS over HTTPS seeks to make internet use more private 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/dns-over-https-seeks-to-make-internet-use-more-private\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/dns-over-https-seeks-to-make-internet-use-more-private\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/11\/dns-over-https-seeks-to-make-internet-use-more-private.jpg","datePublished":"2018-11-20T11:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/dns-over-https-seeks-to-make-internet-use-more-private\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/dns-over-https-seeks-to-make-internet-use-more-private\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/dns-over-https-seeks-to-make-internet-use-more-private\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/11\/dns-over-https-seeks-to-make-internet-use-more-private.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/11\/dns-over-https-seeks-to-make-internet-use-more-private.jpg","width":700,"height":467},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/dns-over-https-seeks-to-make-internet-use-more-private\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"IDG Insider","item":"https:\/\/www.threatshub.org\/blog\/tag\/idg-insider\/"},{"@type":"ListItem","position":3,"name":"DNS over HTTPS seeks to make internet use more private"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/19557","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=19557"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/19557\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/19558"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=19557"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=19557"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=19557"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}