My ISP is AT&T (located in the U.S.) and I have issues loading random websites. Currently have Google DNS set in my router, which works great. But I’m guessing there’s a better, more private, option?
NextDNS has the ability to change the logging region to one that’s outside your governments jurisdiction
I recently switched to NextDNS. I used to run my own AdGuard Home with multiple DNS provider as upstream.
NextDNS is the move, the clients are open sourced and they encrypt everything. Plus their free option covers all my devices, no problem. Highly recommended!
If you need a traditional, unencrypted DNS service, check out Quad9 and AdGuard’s Public DNS. If you can use DoT or DoH, use LibreDNS or Mullvad DNS. If you want more customization, check out NextDNS.
Even DNSCrypt, but I think nobody really uses that.
I use 1.1.1.1 as my dns because I don’t forget it. Should I not be?
I use the cloudflare dns, but there are all kinds of adguard ones too. The Adguard app itself has a big list of options for the fallback.
If you’ve never used adguard, check it out, it can run as a container or on a pi, you just point your router dns at it
In regards to all the answers in this thread, consider: If you’re not paying for it with money, then what are you paying for it with?
The most private DNS is a recursive resolver.
quad9, blahdns, dnscry.pt, ibksturm, koki, litepay.ch serbica
Quad9 (9.9.9.9) is my go to.
This tool is great for figuring out which one is the fastest for you: https://www.grc.com/dns/benchmark.htm
Controld.com. I use their free version that blocks ads and online tracking and malware.
A simple solution is Quad9 aka 9.9.9.9. NextDNS is fairly simple but allows customization.
Check out PrivacyGuides. They have recommendations for DNS including what others have commented
Regular DNS can be monitored, intercepted, and modified however your ISP decides, even with you specifying custom DNS servers.
I run pihole on my LAN, with cloudflared as its upstream DNS. Cloudflared translates regular DNS into DOH using cloudflare and quad9 as the upstream DOH providers (configurable).
Finally I block all port 53 (dns) traffic at the router so it cannot leave my LAN. All LAN devices that want regular DNS are forced to use the LAN DNS server which wraps their requests in DOH for them. (as well as blocking ads, tracking/telemetry, and known malware sites)
What ISP do you use that makes you trust Cloudflare more than your ISP? You must really be between a rock and a hard place.
I’m not all that concerned about either tbh; I was just already capturing DNS traffic and funneling it through pihole for the customizable blocking, and figured I may as well add DOH while I’m at it.
Just sharing the knowledge for those that are interested. You can use any DOH provider you like.
You can run Unbound with PiHole, that way its upstream is root servers instead of a single site.
But at that point pihole is just a fancy web interface with some nice looking but for most purposes useless graphs. I just let Unbound filter stuff with the same filter lists pihole would use.
True, but there’s use in the UI. I.E. manual blocking/unblocking is simplified. Some use ot for DHCP, too.
Adguard Home supports TLS, HTTPs, QUIC and other stuff natively, in case anyone reading wants to set up a pihole equivalent with less work for encrypted DNS.
https://github.com/AdguardTeam/AdGuardHome/wiki/Configuration#upstreams
Why would you need cloudflared? Can’t you justbset DoH/DoT servers as a backend in Pi-Hole?
Pihole doesn’t directly support DOH. What I linked is their official guide for implementing it: using cloudflared.
There is other ways you can do this. This is just what I’ve been using.
Cloudflare 1.1.1.1 Google 8.8.8.8 or 8.8.4.4
You are suggesting trackers
Don’t use these unless you are properly configure them but even then… They are used for tracking
Mullvad and quad9 are better for privacy people
There are others tho
Adguard DNS, so I can block ads in my entire house without having to invest in a PiHole. dns.adguard-dns.com More IPs
I’ve been using Adguard public DNS for over a year across my LAN and it works great, with much less hassle than a pihole, which I previously used for years.
I miss the ability to add random hosts to either black or white lists, but in reality only used it sporadically.
Go directly to the root.