Thursday, February 27, 2025
HomeSecurity NewsNew Android Future " DNS over TLS " going to Stop ISPs...

New Android Future ” DNS over TLS ” going to Stop ISPs from Knowing what websites you visit

Published on

SIEM as a Service

Follow Us on Google News

Android getting New Future called “DNS over TLS” Protocol that helps to stop ISP’s monitoring the Browsing contents such as Knowing what websites you visit using your Android Mobile Phone.

This is one of the very interesting Future that announced by Google for Android to increase the Android user privacy  and you can use Private Encrypted Browser called Tenta to keep you data safe and secure also you can test the Browser privacy using Tenta Platform.

Domain name server is using for Translating the domain name into IP Address by queries a DNS which looks up and returns the concerned domain owned IP address to the client. This Process is a hidden process which is not something that human can see it.

Also Read:   Surprising Differences between TLS and SSL Protocol

This process is presently Performing in Plain text using UDP or TCP protocols which means that anyone can see your Visiting website Domain by sniffing you Browser Traffic by anyone Especially internet Service Provider (ISP) and they can even monitor your internet activities.

Here new Android future comes to play for stop monitoring your online Activities by ISP’s using “DNS over TLS” protocol where “DNS queries will be encrypted” to the same level as HTTPS and thus a DNS can’t actually log or see the websites you visit.

Also Read:  Sniffing as easy as possible with Ettercap

This benefit does require the DNS you are using to have DNS over TLS support so users can switch to Google’s DNS if they wish to benefit from DNS over TLS.

As of now, half the websites are not encrypted over TLS and this new DNS Over TLS will help to increase the user privacy.In terms of this new future, most DNS does not support this encryption. changing the mobile DNS on your phone requires either root access or the use of a VPN app.

According to xda-developers ,It appears that “DNS over TLS” support is being added to Android, according to several commits added to the Android Open Source Project (AOSP). The addition in the Android repository shows that a new setting will be added under Developer Options allowing users to turn on or off DNS over TLS. Presumably, if such an option is being added to Developer Options, then that means it is in testing and may arrive in a future version of Android such as version 8.1.

“Do note that TLS over DNS will not lead to full privacy with the flip of a toggle. If a different DNS service provider you decide to connect to does opt to enable DNS over TLS, they’ll get your DNS traffic instead of your ISP.”

DNS requests will be encrypted, but the DNS over TLS server still gets to see your DNS traffic, though that alone might be a step above using your ISP’s servers without TLS over DNS. xda-developers said.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Lotus Blossom Hacker Group Uses Dropbox, Twitter, and Zimbra for C2 Communications

The Lotus Blossom hacker group, also known as Spring Dragon, Billbug, or Thrip, has...

Squidoor: Multi-Vector Malware Exploiting Outlook API, DNS & ICMP Tunneling for C2

A newly identified malware, dubbed "Squidoor," has emerged as a sophisticated threat targeting government,...

Unpatched Vulnerabilities Attract Cybercriminals as EDR Visibility Remains Limited

Cyber adversaries have evolved into highly organized and professional entities, mirroring the operational efficiency...

Threat Actors Attack Job Seekers of Fortune 500 Companies to Steal Personal Details

In Q3 2024, Cofense Intelligence uncovered a targeted spear-phishing campaign aimed at employees working...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Check Point Software to Open First Asia-Pacific R&D Centre in Bengaluru, India

Check Point Software Technologies Ltd. has announced plans to establish its inaugural Asia-Pacific Research...

Threat Actors Trojanize Popular Games to Evade Security and Infect Systems

A sophisticated malware campaign was launched by cybercriminals, targeting users through trojanized versions of...

New FUD Malware Targets MacOS, Evading Antivirus and Security Tools

A new strain of Fully Undetectable (FUD) macOS malware, dubbed "Tiny FUD," has emerged,...