Monday, March 31, 2025
HomeSecurity NewsNew Android Future " DNS over TLS " going to Stop ISPs...

New Android Future ” DNS over TLS ” going to Stop ISPs from Knowing what websites you visit

Published on

SIEM as a Service

Follow Us on Google News

Android getting New Future called “DNS over TLS” Protocol that helps to stop ISP’s monitoring the Browsing contents such as Knowing what websites you visit using your Android Mobile Phone.

This is one of the very interesting Future that announced by Google for Android to increase the Android user privacy  and you can use Private Encrypted Browser called Tenta to keep you data safe and secure also you can test the Browser privacy using Tenta Platform.

Domain name server is using for Translating the domain name into IP Address by queries a DNS which looks up and returns the concerned domain owned IP address to the client. This Process is a hidden process which is not something that human can see it.

Also Read:   Surprising Differences between TLS and SSL Protocol

This process is presently Performing in Plain text using UDP or TCP protocols which means that anyone can see your Visiting website Domain by sniffing you Browser Traffic by anyone Especially internet Service Provider (ISP) and they can even monitor your internet activities.

Here new Android future comes to play for stop monitoring your online Activities by ISP’s using “DNS over TLS” protocol where “DNS queries will be encrypted” to the same level as HTTPS and thus a DNS can’t actually log or see the websites you visit.

Also Read:  Sniffing as easy as possible with Ettercap

This benefit does require the DNS you are using to have DNS over TLS support so users can switch to Google’s DNS if they wish to benefit from DNS over TLS.

As of now, half the websites are not encrypted over TLS and this new DNS Over TLS will help to increase the user privacy.In terms of this new future, most DNS does not support this encryption. changing the mobile DNS on your phone requires either root access or the use of a VPN app.

According to xda-developers ,It appears that “DNS over TLS” support is being added to Android, according to several commits added to the Android Open Source Project (AOSP). The addition in the Android repository shows that a new setting will be added under Developer Options allowing users to turn on or off DNS over TLS. Presumably, if such an option is being added to Developer Options, then that means it is in testing and may arrive in a future version of Android such as version 8.1.

“Do note that TLS over DNS will not lead to full privacy with the flip of a toggle. If a different DNS service provider you decide to connect to does opt to enable DNS over TLS, they’ll get your DNS traffic instead of your ISP.”

DNS requests will be encrypted, but the DNS over TLS server still gets to see your DNS traffic, though that alone might be a step above using your ISP’s servers without TLS over DNS. xda-developers said.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Hewlett Packard RCE Vulnerability Allows Attackers to Bypass Authentication and Execute Remote Commands

A critical unauthenticated remote code execution (RCE) vulnerability in HPE Insight Cluster Management Utility...

Windows 11 Insider Released – Microsoft Removes BypassNRO.cmd Script to Enhance Security

Microsoft has launched Windows 11 Insider Preview Build 26200.5516 to the Dev Channel with exciting new...

A New Microsoft Tool Automatically Detects, Diagnoses, and Resolves Boot Issues in Windows

Microsoft has unveiled a transformational tool aimed at addressing one of the most frustrating...

Beware! A Fake Zoom Installer Drops BlackSuit Ransomware on Your Windows Systems

Cybersecurity analysts have uncovered a sophisticated campaign exploiting a fake Zoom installer to deliver...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Advanced CoffeeLoader Malware Evades Security to Deliver Rhadamanthys Shellcode

Security researchers at Zscaler ThreatLabz have identified a new sophisticated malware family called CoffeeLoader,...

Clio: Real-Time Logging Tool with Locking, User Authentication, and Audit Trails

Clio is a cutting-edge, secure logging platform designed specifically for red team operations and...

Enhancing Satellite Security by Encrypting Video Data Directly on Payloads

The rapid expansion of low-Earth orbit (LEO) satellite constellations has underscored the need for...