Enhanced Privacy
DNSCrypt encrypts DNS requests, which prevents ISPs and other intermediaries from snooping on the queries made by users, protecting privacy.
Integrity Verification
It provides integrity verification to ensure that the responses received from DNS servers haven't been tampered with, safeguarding users from data manipulation attacks.
Resistance to DNS Spoofing
By encrypting DNS requests and responses, DNSCrypt helps prevent DNS spoofing attacks, where attackers redirect users to malicious sites.
Open Source
As an open-source protocol, DNSCrypt allows for community-driven improvements and audits, ensuring transparency and trustworthiness.
Up until recently, I've used it with quad9 DNS, which is fine, but as people found out, we can make it work with dnscrypt-proxy, which allows us to use DNSCrypt, which basically is a protocol that encrypts, authenticates and optionally anonymizes communications between a DNS client and a DNS resolver. It prevents DNS spoofing. It uses cryptographic signatures to verify that responses originate from the chosen DNS... Source: about 2 years ago
DNSCrypt (open source) can use a blacklist https://dnscrypt.info/. Source: about 2 years ago
If I wasn't doing all that, I would probably just stick with something like DNScrypt. Source: over 2 years ago
Https://dnscrypt.info/ - Totally free and fun but intense bunch of programs. If you are willing to learn, its ready and waiting, unrestricted and free. The guides are easy and after a good sitting you will have the confidence needed to surf. - Source: dev.to / over 2 years ago
Running your own local recursive caching DNS resolver is always good. Something like a Pihole for home networks works well. You can also host your own DNS resolver on a VPS, and then connect to it using DNSCrypt. Source: over 2 years ago
Well... You could try installing rethink vpn + firewall and configure dnscryptservers in it. Source: over 2 years ago
DNSCrypt includes those encryption protocols. Do you use AdGuard Home - DNSCrypt? Source: almost 3 years ago
This is FUD. This possibility has nothing to do with HTTP vs. [some other DNS-like protocol] sitting on top of an encrypted connection. This possibility is, however, enabled by having the application package its own DNS resolution. If you want to use DNS over HTTPS as a system-wide daemon, you can use DNSCrypt 2 (https://dnscrypt.info/ ) and disable DoH within Firefox/Chrome. - Source: Hacker News / about 3 years ago
Local ISP's DNS censorship is rather easy to circumvent: https://dnscrypt.info/. Source: about 3 years ago
It's not Cloudflare's fault. In any case in order to maintain privacy I use https://dnscrypt.info it has an anonymized DNS option https://github.com/DNSCrypt/dnscrypt-proxy/wiki/Anonymized-DNS I then just use unbound and forward that to DNSCrypt on my router. https://wiki.archlinux.org/title/DNSCrypt#Unbound. - Source: Hacker News / over 3 years ago
I'd recommend using something like DNSCrypt/Simple DNSCrypt and not cloudflare or google. Check out PrivacyTools.io for better recommendations. Source: almost 4 years ago
Use encrypted DNS. My favorite protocol is DNSCRYPT. I use dnscrypt servers both on my laptop and computer. You can also run a pihole to filter out ads, trackers, and more. There are also other options like Adguard DNS. Source: about 4 years ago
Do you know an article comparing DNSCrypt Protocol to other products?
Suggest a link to a post with product alternatives.
This is an informative page about DNSCrypt Protocol. You can review and discuss the product here. The primary details have not been verified within the last quarter, and they might be outdated. If you think we are missing something, please use the means on this page to comment or suggest changes. All reviews and comments are highly encouranged and appreciated as they help everyone in the community to make an informed choice. Please always be kind and objective when evaluating a product and sharing your opinion.