Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Reorganize DNS recommendations #2330

Merged
merged 1 commit into from
Mar 30, 2024
Merged

Conversation

jonaharagon
Copy link
Member

@jonaharagon jonaharagon commented Nov 15, 2023

Changes proposed in this PR:

Additional changes:

  • I have disclosed any relevant conflicts of interest in my post.
  • I agree to grant Privacy Guides a perpetual, worldwide, non-exclusive, transferable, royalty-free, irrevocable license with the right to sublicense such rights through multiple tiers of sublicensees, to reproduce, modify, display, perform, relicense, and distribute my contribution as part of this project.
  • I am the sole author of this work.
  • I agree to the Community Code of Conduct.

@privacyguides-bot
Copy link
Collaborator

This pull request has been mentioned on Privacy Guides. There might be relevant details there:

https://discuss.privacyguides.net/t/split-dns-recommendations-into-secure-non-filtering-providers-and-filtering-saas-providers/15026/2

Copy link

netlify bot commented Nov 15, 2023

Deploy Preview for privacyguides ready!

Name Link
🔨 Latest commit f37e720
🔍 Latest deploy log https://app.netlify.com/sites/privacyguides/deploys/6607e07b19ced40008f3a16e
😎 Deploy Preview https://deploy-preview-2330.preview.privacyguides.dev
📱 Preview on mobile
Toggle QR Code...

QR Code

Use your smartphone camera to open QR code link.
Lighthouse
Lighthouse
4 paths audited
Performance: 76 (no change from production)
Accessibility: 91 (🔴 down 1 from production)
Best Practices: 81 (🔴 down 17 from production)
SEO: 90 (no change from production)
PWA: -
View the detailed breakdown and full score reports

To edit notification comments on pull requests, go to your Netlify site configuration.

@privacyguides-bot
Copy link
Collaborator

This pull request has been mentioned on Privacy Guides. There might be relevant details there:

https://discuss.privacyguides.net/t/nextdns-free-security-after-300k-queries/15025/17

@dngray dngray added the c:enhancements new features or other enhancements to the website itself label Nov 19, 2023
@jonaharagon jonaharagon added this to the v3.19 milestone Nov 21, 2023
@jonaharagon jonaharagon force-pushed the jonaharagon/clarify-dns-providers branch from 5fbe029 to 43ed1b7 Compare March 13, 2024 14:35
@privacyguides-bot
Copy link
Collaborator

This pull request has been mentioned on Privacy Guides. There might be relevant details there:

https://discuss.privacyguides.net/t/dns0-dns-provider/12231/7

@privacyguides-bot
Copy link
Collaborator

This pull request has been mentioned on Privacy Guides. There might be relevant details there:

https://discuss.privacyguides.net/t/nextdns-logging-is-opt-out-not-opt-in-as-stated-on-pgs-dns-resolvers-recommendations-page/17206/35

jonaharagon added a commit that referenced this pull request Mar 13, 2024
@jonaharagon jonaharagon force-pushed the jonaharagon/clarify-dns-providers branch from 43ed1b7 to 1e89211 Compare March 13, 2024 15:32
@jonaharagon jonaharagon marked this pull request as ready for review March 13, 2024 15:32
@jonaharagon jonaharagon requested a review from dngray March 13, 2024 15:32
@Mikaela
Copy link
Contributor

Mikaela commented Mar 14, 2024

You are missing signed profiles at least for DNS0 and Mullvad if I am reading this correctly on mobile.

@Mikaela
Copy link
Contributor

Mikaela commented Mar 14, 2024

Why not have a field in the table for Apple support actually?

@dngray dngray force-pushed the jonaharagon/clarify-dns-providers branch from 534bc1b to 5ad0d21 Compare March 14, 2024 11:30
@dngray dngray force-pushed the jonaharagon/clarify-dns-providers branch from 23058e3 to 8dcbfb2 Compare March 14, 2024 13:22
docs/dns.md Outdated
| [**Control D Free DNS**](https://controld.com/free-dns) | [:octicons-link-external-24:](https://controld.com/privacy) | Cleartext DoH/3 DoT DoQ | Optional[^3] | No | Based on server choice. | [Yes](https://docs.controld.com/docs/macos-platform) |
| [**dns0.eu**](https://dns0.eu) | [:octicons-link-external-24:](https://dns0.eu/privacy) | Cleartext DoH/3 DoH DoT DoQ | No | Anonymized | Based on server choice. | [Yes](https://quad9.net/news/blog/ios-mobile-provisioning-profiles) |
| [**Mullvad**](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) | [:octicons-link-external-24:](https://mullvad.net/en/help/no-logging-data-policy) | DoH DoT | No[^4] | No | Based on server choice. Filter list being used can be found here. [:octicons-link-external-24:](https://github.com/mullvad/dns-adblock) | [Yes](https://mullvad.net/en/blog/profiles-to-configure-our-encrypted-dns-on-apple-devices) |
| [**NextDNS**](https://nextdns.io) | [:octicons-link-external-24:](https://nextdns.io/privacy) | Cleartext <br> DoH/3 <br> DoT <br> DoQ | Optional[^5] | Optional | Based on personal configuration. | [Yes](https://apple.nextdns.io)
Copy link
Member

@dngray dngray Mar 14, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Remove NextDNS until their privacy policy reflects their current defaults: https://discuss.privacyguides.net/t/nextdns-logging-is-opt-out-not-opt-in-as-stated-on-pgs-dns-resolvers-recommendations-page/17206/31

I really want to avoid removing things and re-adding them. I've contacted them and am waiting on a reply. I don't think they're doing anything nefarious as they don't sell the data to third parties.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Removing NextDNS from this table is intentional regardless of their privacy policy update btw. It isn't really a good public/free DNS provider no matter how you look at it, but the dns0.eu project (run by them) is, so dns0 is intended to replace them entirely here.

If we list NextDNS, it would go in the other section under Control D.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It does seem the same people are involved, and making commits to NextDNS related repos.

In any case NextDNS is used by both Firefox and Chrome as an alternative DNS provider. The PP related concerns only related to the default for account based usage (not people directly using dns.nextdns.io etc.

I have reached out to them for comment though.

docs/dns.md Outdated Show resolved Hide resolved
@dngray dngray force-pushed the jonaharagon/clarify-dns-providers branch from 8dcbfb2 to 99dd4e3 Compare March 15, 2024 01:32
@jonaharagon jonaharagon requested a review from dngray March 15, 2024 15:33
@jonaharagon jonaharagon requested a review from freddy-m March 28, 2024 07:01
@jonaharagon jonaharagon force-pushed the main branch 7 times, most recently from a6231a8 to e8399ae Compare March 29, 2024 03:11
@dngray dngray force-pushed the jonaharagon/clarify-dns-providers branch from ab99859 to f37e720 Compare March 30, 2024 09:50
@dngray dngray temporarily deployed to preview-netlify March 30, 2024 09:52 — with GitHub Actions Inactive
@dngray dngray merged commit f37e720 into main Mar 30, 2024
23 checks passed
@dngray dngray deleted the jonaharagon/clarify-dns-providers branch March 30, 2024 09:55
@privacyguides-bot
Copy link
Collaborator

This pull request has been mentioned on Privacy Guides. There might be relevant details there:

https://discuss.privacyguides.net/t/nextdns-logging-is-opt-out-not-opt-in-as-stated-on-pgs-dns-resolvers-recommendations-page/17206/48

@redoomed1 redoomed1 mentioned this pull request Jul 11, 2024
2 tasks
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
c:enhancements new features or other enhancements to the website itself
Projects
None yet
Development

Successfully merging this pull request may close these issues.

DNS section doesn't consider private ECS
4 participants