Every time you type a website address into your browser, something invisible happens behind the scenes. Your device needs to figure out where that website actually lives on the internet. That is the job of DNS, which stands for Domain Name System.
Think of DNS as the phone book of the internet. When you want to call a friend, you look up their name in your contacts and your phone dials their number. DNS works the same way: you type a human-readable name like google.com, and DNS translates it into a machine-readable IP address like 142.250.80.46 so your browser knows where to connect.
Your devices do this thousands of times per day without you ever noticing. Every website, every app, every notification that pops up on your phone starts with a DNS lookup. Without DNS, you would have to memorize long strings of numbers for every website you want to visit. Imagine typing 142.250.80.46 instead of google.com every single time.
When you type a URL and press Enter, a chain of events unfolds in milliseconds:
google.com, they point to the .com servers..com servers (called Top-Level Domain servers) know which server is authoritative for google.com and point the resolver there.DNS was invented in 1987. At that time, the internet was a small academic network and security was not a concern. The original protocol, often called Plain DNS, sends queries over port 53 using UDP. It is fast, simple, and has worked reliably for nearly four decades.
The problem? Plain DNS sends everything in plain text. There is no encryption whatsoever. This means:
DoH encrypts your DNS queries inside HTTPS, the same encryption technology used for online banking and shopping. When you see the padlock icon in your browser, that is HTTPS at work, and DoH uses the exact same protection for your DNS queries.
DoH runs on port 443, which is the same port used by all regular HTTPS web traffic. This makes it virtually impossible for anyone to distinguish your DNS queries from normal browsing. A typical DoH URL looks like: https://dns.example.com/dns-query.
DoH is supported by all major browsers including Chrome, Firefox, Edge, and Safari, as well as Android and iOS. Because it blends in with regular web traffic, ISPs and network administrators cannot easily block it.
The only downside is a slight overhead from the TLS handshake required to establish the encrypted connection. In practice, this adds a few milliseconds at most and is unnoticeable during normal browsing.
DoT encrypts DNS queries using TLS, the same underlying encryption technology as DoH, but takes a different approach. Instead of wrapping DNS inside HTTPS, DoT uses a dedicated port: 853.
This dedicated port is a double-edged sword. On one hand, it makes DoT easy for network administrators to identify and manage. On the other hand, it means your ISP can see that you are using encrypted DNS, even though they cannot see what you are querying.
DoT is natively supported by Android 9 and newer through the Private DNS setting, making it the easiest encrypted DNS option for Android users. Some routers also support it. The format is simply a hostname like dns.example.com on port 853.
DoT is a great choice for organizations that want encrypted DNS but still need network visibility to confirm that DNS traffic is flowing properly.
DoQ is the newest DNS protocol, built on top of QUIC, the same technology that powers HTTP/3. If you have noticed websites loading faster in recent years, QUIC is a big part of the reason.
What makes DoQ special is its speed. QUIC supports 0-RTT connection establishment, which means reconnecting to a DNS server you have used before is nearly instant. DoQ also handles packet loss much better than TCP-based protocols, making it particularly effective on mobile networks where connections are less stable.
DoQ uses port 853 UDP (the same port number as DoT, but over UDP instead of TCP). The format looks like: quic://dns.example.com.
As the newest option, DoQ is still gaining adoption and is supported by fewer clients and providers. But it represents the future of encrypted DNS, combining the best of privacy and performance.
| Protocol | Port | Encryption | ISP Privacy | Speed | Browser Support | Mobile | Block Resistance |
|---|---|---|---|---|---|---|---|
| Plain DNS | 53 UDP | None | ✗ | Fastest | All | All | Easy to block |
| DoH | 443 TCP | TLS | ✓ | Fast | Chrome, Firefox, Edge, Safari | iOS, Android | Very hard |
| DoT | 853 TCP | TLS | ✓ | Fast | Limited | Android 9+ | Moderate |
| DoQ | 853 UDP | QUIC | ✓ | Fastest encrypted | Limited | Limited | Moderate |
The best choice depends on your situation:
Your DNS queries paint a detailed picture of your entire online life. Every website you visit, every app you open, every smart device that phones home starts with a DNS lookup. If someone can see your DNS traffic, they know what news you read, what you shop for, what medical symptoms you searched, and what you do at 2 AM.
In many countries, ISPs are legally allowed to collect and sell this data. Even where laws protect privacy, unencrypted DNS is an easy target for surveillance.
Using encrypted DNS solves the privacy problem, but it does not solve the security problem. A DNS provider that also filters your queries adds an active layer of protection: blocking malware domains before they load, stopping phishing sites before you enter your password, and preventing trackers from following you across the web.
The combination of encrypted DNS and intelligent filtering gives you both privacy and security. Your ISP cannot see your queries, and threats are blocked before they ever reach your device.
Encrypted DNS filtering with full support for DoH, DoT, DoQ, and DoH3. Block ads, malware, and trackers at the DNS level. Set up in under 2 minutes.
Start Free