Encrypted DNS Services

Post-quantum secure DNS-over-HTTPS (DoH) and DNS-over-TLS (DoT)

Service Endpoints

DNS-over-HTTPS (DoH): https://dns.practicallyunhackable.com/dns-query

DNS-over-TLS (DoT): dns.practicallyunhackable.com (port 853)

IP Address: 128.254.206.25

Why Encrypted DNS?

Traditional DNS queries are plaintext, exposing your browsing activity to ISPs and network observers. DoH and DoT encrypt DNS traffic, protecting privacy and preventing manipulation.

DoH uses HTTPS (port 443) and blends with web traffic. DoT uses dedicated port 853, easier to configure system-wide.

Quick Setup

Browsers

Firefox: Settings → Privacy & Security → DNS over HTTPS → Max Protection → Custom → https://dns.practicallyunhackable.com/dns-query

Chrome/Edge: Settings → Privacy and security → Security → Use secure DNS → Custom → https://dns.practicallyunhackable.com/dns-query

Android 9+

Settings → Network & Internet → Private DNS → Private DNS provider hostname → dns.practicallyunhackable.com

Linux (systemd-resolved)

Edit /etc/systemd/resolved.conf:

DNS=128.254.206.25
DNSOverTLS=yes

Then: sudo systemctl restart systemd-resolved

iOS 14+

Install DNSecure or DNSCloak, configure with our DoH or DoT endpoint.

Windows 11

Use browser configuration (recommended) or install DNSCrypt-Proxy for system-wide DoH.

macOS

Configure DoH in Safari/Chrome, or install DNSCrypt-Proxy for system-wide support.

Technical Specifications

DoH: RFC 8484, HTTP/2 over TLS 1.3, port 443

DoT: RFC 7858, TLS 1.3, port 853, DANE/TLSA validated

Features: Unbound resolver, DNSSEC validation, post-quantum cryptography, IPv6 support, no logging

Which One?

Use DoT for: Android, Linux, network-wide configs, dedicated encrypted DNS

Use DoH for: Browsers, when port 853 is blocked, iOS apps, traffic camouflage

Verification

Test at Cloudflare DNS checker or DNS Leak Test

Privacy Commitment

Zero logging. No query storage, tracking, or sharing. Research project, no commercial use. Services provided as-is for privacy-conscious users.