Yet another EM7455 question
list1 at michaelshell.org
Fri Jun 24 19:55:20 UTC 2016
On Fri, 24 Jun 2016 12:57:35 +0200
Bjørn Mork <bjorn at mork.no> wrote:
> This means that some operators filter the Google DNS servers.
In addition to using a VPN, one option to overcome such increasingly
commonb and vile ISP behavior is DNSCrypt:
The list of known encrypted DNS servers is stored in
The DNS crypt daemon is started like:
/usr/sbin/dnscrypt-proxy --daemonize -u dnscrypt --resolvers-list=/usr/share/dnscrypt-proxy/dnscrypt-resolvers.csv --resolver-name=open
To bypass ISP UDP traffic filters, you can add the --tcp-only option.
There also is --resolver-address=<ip>[:port]
Just set your /etc/resolv.conf to contain:
# the local DNSCrypt proxy
and the system will use the DNSCrypt proxy connection for
BTW, many mobile ISPs, at least T-Mobile, are now using a web
proxy to snoop on all open http (non-https) traffic.
The days of any unencrypted web traffic are coming to an
end and with good reason it seems.
More information about the ModemManager-devel