Fixxx
Moderator
- Joined
- Aug 21, 2024
- Messages
- 760
- Reaction score
- 3,654
- Points
- 93

Incognito mode only creates a local illusion of privacy. The real “privacy hole” is one level up: your Internet provider sees every DNS request, so it knows which sites you visit even if the connection to them is protected by HTTPS. In this article we’ll explain how to switch to private encrypted DNS servers in a few minutes. That will not only hide your browsing history from your ISP, but as a nice bonus - speed up the internet, block a large portion of ads and protect you from phishing.
Why this matters - a bit of Theory
Here’s the basic mechanics. When you type site.com in your browser, your computer sends a query to a DNS server (usually your provider’s) asking: “What is the IP of site.com?” The server replies, and only then does the browser establish the connection. The problem is that by default this query can be read by anyone on the path - first and foremost your ISP. It sees which domains you request and can easily log every site its customers visit. Modern encrypted DNS protocols address exactly this problem:
- DNS over TLS (DoT): wraps DNS queries in a protected TLS tunnel. It uses a dedicated port (853), which makes its traffic recognizable.
- DNS over HTTPS (DoH): hides DNS queries inside ordinary HTTPS traffic (port 443). Externally it's indistinguishable from regular web browsing, which makes blocking it nearly impossible without breaking large parts of the internet.
Step 1: Choose a Service
There are many public DNS servers, each with its own philosophy. Here are some popular, well‑tested options.
Service | Main focus | Pros | Cons | |||
---|---|---|---|---|---|---|
AdGuard DNS | Ad and tracker blocking | Effectively cuts ads across devices, speeding up page loads. Offers variants (no-blocking, family). | Aggressive blocking can sometimes break certain sites. | |||
Quad9 | Security |
|
| |||
Cloudflare DNS |
|
|
| |||
NextDNS |
|
|
|
In the instructions below I’ll use AdGuard DNS and Quad9 addresses as examples, but you can use any service from the list.
Step 2: Step-by-step Guide
Time for practice. This really takes only a few minutes.
Android
Android makes this easy via native Private DNS (DoT) support.
- Open Settings → Network & internet → Advanced → Private DNS. Paths vary by skin, so searching “DNS” in Settings can be easiest.
- Select “Private DNS provider hostname”.
- Enter the provider hostname, e.g. dns.adguard-dns.com or dns.quad9.net.
- Tap Save.
iOS / iPadOS
Apple supports encrypted DNS via configuration profiles.
- Open Safari and visit a profile generator such as AdGuard’s: https://adguard-dns.io/ru/public-dns.html.
- Choose “Method 2”. Select the server you want (for example AdGuard DNS) and tap “Download profile”.
- Allow the profile download when prompted.
- Open Settings - a “Profile Downloaded” item will appear at the top. Tap it.
- Tap Install (top right) and follow the prompts. After installation, DNS traffic will be protected.
Windows 11
Windows 11 has built-in DNS over HTTPS support.
GUI method:
- Open Settings → Network & internet.
- Select your active connection (Wi‑Fi or Ethernet).
- Click Hardware properties.
- Under “DNS server assignment” click Change.
- Choose Manual and enable IPv4.
- Enter preferred and alternate DNS IPs, e.g. 94.140.14.14 and 94.140.15.15.
- For “Preferred DNS encryption” and “Alternate DNS encryption” select “Encrypted only (DNS over HTTPS)”.
- Click Save.
PowerShell method:
Run PowerShell as Administrator and, replacing the interface name as needed, execute:
Code:
Set-DnsClientServerAddress -InterfaceAlias "Wi-Fi" -ServerAddresses ("94.140.14.14","94.140.15.15")
macOS GUI method:
- Open System Settings → Network.
- Select your active connection and click Details….
- Go to the DNS tab.
- Click + and add the DNS server IPs (e.g. 9.9.9.9 and 149.112.112.112).
- Click OK.
Terminal method:
Example for Wi‑Fi and Quad9:
Code:
networksetup -setdnsservers Wi-Fi 9.9.9.9 149.112.112.112
Note: for native DoH/DoT support on macOS (as on iOS) you may need to install a configuration profile.
Linux
Open the config file:
Code:
sudo nano /etc/systemd/resolved.conf
Uncomment or add these lines in the [Resolve] section: [/CODE][Resolve] DNS=94.140.14.14 94.140.15.15 DNSOverTLS=opportunistic[/CODE] Replace DNS=… with the IP addresses of your chosen servers separated by spaces. DNSOverTLS=opportunistic makes the system attempt DoT when possible and fall back to plaintext if not - this avoids breaking connectivity if DoT is blocked or temporarily unavailable. Save (Ctrl+O, Enter) and exit (Ctrl+X). Restart the service:
Code:
sudo systemctl restart systemd-resolved
Verify:
Code:
resolvectl status
Conclusion
You’ve just taken a big step toward better digital hygiene. Your ISP will now see significantly less about your network activity and depending on the service you chose, you’ll gain strong protection against ads or malicious sites. This simple change requires little technical knowledge and delivers an immediate, tangible benefit.