Friday, April 11, 2025
HomeComputer Security8.8.8.8 - Google Public DNS now Support DNS-over-TLS to Protect Customer Search...

8.8.8.8 – Google Public DNS now Support DNS-over-TLS to Protect Customer Search Queries

Published on

SIEM as a Service

Follow Us on Google News

Google Public DNS (8.8.8.8) now officially supports DNS-over-TLS that provides complete privacy for users and their search queries between their devices and Google Public DNS.

DNS allows to convert Internet domain names like www.gbhackers.com into IP addresses, in this case, un protect users queries exposed the sensitive information.

New Implementation of DNS-over-TLS now supports Google Public DNS that helps users to perform a secure query and it will be completely transmitted via the encrypted channel.

- Advertisement - Google News

Google Public DNS  launched almost 8 years ago Since then Google now implemented DNS-over-TLS protocol mission in order to provide better privacy and security.

This will completely improve the privacy and security between clients and resolvers that protect from eavesdropping and spoofing attacks.

Traditional DNS queries and responses are sent over UDP or TCP without encryption which is vulnerable to eavesdropping and spoofing but this new
 Google Public DNS over TLS-encrypted TCP connections as specified by RFC 7858

So users now can secure their connections to Google Public DNS with TLS, the same technology that protects their HTTPS web connections.

According to Google, “We implemented the DNS-over-TLS specification along with the RFC 7766 recommendations to minimize the overhead of using TLS. These include support for TLS 1.3 (for faster connections and improved security), TCP fast open, and pipelining of multiple queries and out-of-order responses over a single connection. “

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Also Read: Cloudflare Announced Internet’s Fastest DNS Service 1.1.1.1 that Extremely Focus on Consumer Privacy

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Hands-On Labs: The Key to Accelerating CMMC 2.0 Compliance

INE Security Highlights How Practical, immersive training environments help defense contractors meet DoD cybersecurity...

CISA Issues 10 ICS Advisories Addressing Critical Vulnerabilities and Exploits

The Cybersecurity and Infrastructure Security Agency (CISA) has issued ten new Industrial Control Systems...

Sensata Technologies Breached: Ransomware Attack Key Systems

Sensata Technologies Holding PLC, a global leader in sensor solutions and electrical protection, is...

TROX Stealer Harvests Sensitive Data Including Stored Credit Cards and Browser Credentials

Cybersecurity experts at Sublime have uncovered a complex malware campaign revolving around TROX Stealer,...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Google Introduces A2A Protocol, Empowering AI Agents to Team Up and Automate Workflows

Google Cloud announced the launch of a pioneering open protocol named Agent2Agent (A2A), aiming...

Chrome Use-After-Free Vulnerability Enables Remote Code Attacks

Google has rolled out a critical update for its Chrome browser, addressing a high-severity...

Hackers Conceal NFC Carders Behind Apple Pay and Google Wallet

In a disturbing evolution of financial fraud, cybercriminals are leveraging advanced techniques to exploit...