Thus said Michael Torrie on Mon, 09 Sep 2019 15:04:09 -0600: > As many of you know recent releases of Firefox have implemented DNS > over HTTPS (their own idea as opposed to the standard DNS over TLS), > which bypasses your local DNS and uses cloudfare's DNS server on port > 443.
I was not aware of this unprecedented and disastrous behavior, thank you for sharing---it reminds me of how Verisign wanted to hijack [1] all unregistered domains with wildcards and redirect to their own servers. It almost makes me want to implement whitelisting for domains... I already have a large selection of domains that I block but it's getting increasingly more difficult to keep track of all such "canary" domains. [1] https://www.dslreports.com/shownews/33050 Thanks, Andy -- TAI64 timestamp: 400000005d7701cb /* PLUG: http://plug.org, #utah on irc.freenode.net Unsubscribe: http://plug.org/mailman/options/plug Don't fear the penguin. */
