It's obviously a bug, but let's not overblow it. It has limited impact and can easily be mitigated by setting a loopback or null DNS server in the "blocking" state.

I also don't trust devices and apps to use my preferred DNS servers. This is why I route all traffic to port 53 (plain DNS), 853 (DoT) to my own DNS server. The only thing that escapes the net is DoH which would require manually blocking a list of common DoH IPs, which I never bothered to do...

nostr:nevent1qvzqqqqqqypzp50ncutrnt3mhgtll3kgm6clmva9v5rtxjfzz0grx55vc2g4ydcyqy2hwumn8ghj7mn0wd68ytn00p68ytnyv4mz7qpqa5q7rpqxa5ydfmy9y08jyuh9tlf5l8krnm8wvc48vu0fnncemamspr2gk7

Reply to this note

Please Login to reply.

Discussion

No replies yet.