Yet another EM7455 question

Michael Shell list1 at
Fri Jun 24 19:55:20 UTC 2016

On Fri, 24 Jun 2016 12:57:35 +0200
Bjørn Mork <bjorn at> wrote:

> This means that some operators filter the Google DNS servers.  

In addition to using a VPN, one option to overcome such increasingly
commonb and vile ISP behavior is DNSCrypt:

The list of known encrypted DNS servers is stored in 

The DNS crypt daemon is started like:

 /usr/sbin/dnscrypt-proxy --daemonize -u dnscrypt --resolvers-list=/usr/share/dnscrypt-proxy/dnscrypt-resolvers.csv --resolver-name=open

To bypass ISP UDP traffic filters, you can add the --tcp-only option.
There also is --resolver-address=<ip>[:port]


man dnscrypt-proxy

for details. 

Just set your /etc/resolv.conf to contain:

# the local DNSCrypt proxy

and the system will use the DNSCrypt proxy connection for
DNS lookups.

BTW, many mobile ISPs, at least T-Mobile, are now using a web
proxy to snoop on all open http (non-https) traffic.

The days of any unencrypted web traffic are coming to an
end and with good reason it seems.


  Mike Shell

More information about the ModemManager-devel mailing list