Cloudflare and Apple launch privacy-focused DNS protocol
Oblivious DNS-over-HTTPS safeguards users' browsing habits from third parties
ODoH, which stands for Oblivious DNS-over-HTTPS, was developed by engineers from Cloudflare, Apple, and Fastly and works by separating IP addresses from queries in order to safeguard users’ browsing habits from third parties, including internet service providers.
The tool works by encrypting a DNS query and passing it through a proxy server between the user and the website they intend on visiting. Due to the DNS query being encrypted, the proxy has no way of identifying its contents and even prevents the DNS resolver from specifying who is the sender of the query.
That is why the ‘O’ in ODoH stands for ‘oblivious’, because, as Cloudflare engineers Sudheesh Singanamalla and Tanya Verma explained on the company’s blog, “the target only knows about the proxy, the target and any upstream resolver are oblivious to the existence of any client IP addresses”.
“This puts clients in greater control over their queries and the ways they might be used. For example, clients could select and alter their proxies and targets any time, for any reason,” they added.
According to Cloudflare, ODoH does not negatively impact performance in any way, making prioritising privacy easier for its users.
The tool was launched with Cloudflare’s proxy partners, including PCCW, SURF, and Equinix. SURF technical product manager Joost van Dijk described the move to ODoH as “a true paradigm shift, where the users’ privacy or the IP address is not exposed to any provider, resulting in true privacy”.
“With the launch of ODoH-pilot, we’re joining the power of Cloudflare’s network to meet the challenges of any users around the globe. The move to ODoH is not only a paradigm shift but it emphasizes how privacy is important to any users than ever, especially during 2020. It resonates with our core focus and belief around Privacy,” he added.
DNS-over-HTTPS has been met with some controversy in the UK due to its conflict with the Investigatory Powers Act, which requires that ISPs at least have the ability to capture information about their customers if so required by the state.
Managing security risk and compliance in a challenging landscape
How key technology partners grow with your organisationDownload now
Evaluate your order-to-cash process
15 recommended metrics to benchmark your O2C operationsDownload now
AI 360: Hold, fold, or double down?
How AI can benefit your businessDownload now
Getting started with Azure Red Hat OpenShift
A developer’s guide to improving application building and deployment capabilitiesDownload now