YouTube to Text Converter

Transcript of Your ISP Is Watching Everything - Fix It With DNS Filtering!

Video Transcript:

If your Smart TV is spying on you,  your phone is narcing, and your ISP   is selling your secrets… this video is for you.” I’ve made a few videos lately, including one about   VPN services, and two about Smart TV surveillance  and tracking – linked in the video description   below. In them, I briefly touched on DNS. DNS filtering sounds boring, but it can   kill 70-90% of the junk hitting your devices.  Less tracking. Fewer ads. More privacy - across   almost every device you own. And it’s easier than you think. Intro Welcome back to Dad Explains Everything.  Today I’m covering DNS filtering. This quality  of life hack will change your online experience   in all the right ways. Sound technical? Well, it  can be, but I’ve made sure that there’s something   in here for everyone. After all, I think this  stuff is fun, and I’ve been doing it for decades.  But if that’s not you, don’t worry -  there are solutions in this video for   people of every level of technological  curiosity and capability. Better still,   the easiest of these solutions  only takes a few minutes to enable. So, what DNS Is, How does it work,  and How does it Leak Your Life Story  DNS, or the Domain Name System, is  basically the internet’s phone book.  But instead of finding tow  trucks, it finds servers.  You see, internet communication works with IP  addresses that look like this (8.8.8.8), or   this (fe80::8f58:946d:9294:1fdb%18). But  normal people don’t remember IP addresses,   so DNS was created to allow structured names  like www.youtube.com to be translated to   something like this (173.194.219.91). When you type “youtube.com,” your   device asks a DNS server: “Hey, where’s YouTube?”  And here’s the journey – simplified  a bit for non-networking people:  1. Your device asks your DNS  resolver about Youtube.com  2. That resolver asks the root DNS servers 3. They point to the TLD server (.com)  4. That server points to  YouTube’s authoritative DNS server  5. You get back an IP address 6. Your browser connects to that IP  This loop happens hundreds or thousands  of times, per hour, per device.  Your phone does it. Your laptop does it.  Your apps do it. Your Smart TV does it.  And your IoT dishwasher probably does it too,   because apparently someone needs  to know if you enabled StormWash. The Privacy Problem So, if DNS requests are basically   cross-reference lookups, what’s the problem? After all, DNS requests are basically:  • A timestamp • Your IP address   (generally your router’s WAN IP, when at home) • The host and/or domain you’re trying to access  • The device that asked That still doesn’t really seem   like a big deal, until you realize that these  requests reveal a ridiculous amount of data:  • When you wake up • When you go to sleep  • What apps you open • What sites you visit  • What streaming services you’re  watching on your TV or other devices  • When you’re home, away, or on vacation • What devices you own  • And your entire behavioral  pattern mapped second by second  ISPs love this data. Because they sell it.  They build profiles from it. They use it for ad targeting.  DNS is one of the largest unregulated  privacy leaks in your digital life.  Which makes it the perfect thing to fix. And there are multiple ways to do   that - encrypted DNS, third-party filtering  services, or hosting your own DNS server.   I’ll cover all of those. But first, let me show  you the DNS trick that gives you instant privacy   improvements.________________________________________ How DNS Filtering Blocks Ads, Trackers,   Telemetry & Smart TV Spying A simple but powerful trick is   to have a DNS server respond to hostnames you  don’t want your devices talking to by either:  • failing to resolve the host or domain, or • returning a bogus IP  It’s essentially like adding  fake entries to a HOSTS file.  Put another way: It’s like me ripping out the   pages of the phone book belonging to scammers,  stalkers, telemarketers, and people trying   to sell you magic supplements on TikTok. If a domain is blocked at the DNS level:  • The ad server can’t load, and won’t show ads • The tracking pixel never fires, so there’s   less tracking of your activites • The telemetry server never   receives your device analytics • ACR requests from Smart TVs   never reach their corporate mothership So here’s an incomplete list of what DNS   filtering CAN block: • Banner ads  • Mobile app tracking • Smart TV tracking  • Background telemetry • Analytics beacons  • Direct data exfiltration to data brokers • Hidden scripts in mobile apps  • Botnet callbacks • Malware domains  • Phishing sites 🎭 And here’s a partial list   of what DNS filtering CANNOT block: • YouTube ads that are in the   same domain as the video • In-stream TikTok/Instagram ads  • Netflix/Hulu ads in ad-supported plans As you can see from the exceptions,   DNS filtering isn’t a magical ad-killer. It’s a network-level bouncer who kicks out 70–90%   of the trash before it reaches your devices. Your browser doesn’t have to do the work.  Your devices don’t have to do the work. The network takes care of it before   anything loads. And your Smart TV?  It gets the digital equivalent  of its mouth duct-taped shut.  If you haven’t watched Part 1 and Part  2 of my Smart TV surveillance videos,   I highly recommend them as they show you how  to turn off this tracking at the source. DNS   filtering is good as a backup, in case you  don’t trust the manufacturers to honor your   settings.________________________________________ The Full Menu of DNS Solutions  So, I promised that there would be  a gradient of options, and there is!  Generally, you can pick from solutions that are: • Free  • Free* • A subscription that’s relatively inexpensive  Some of the solutions are “easy  enough for your grandparents”,   while others stray into “Dad has opened a terminal  window and things are about to get serious.”  As always, I’m happy to engage with all of  you in the comments section. If I missed   one of your favorite solutions, or if you  have questions, feel free to write me below.  With that, I’m going to start with the  beginner tier. These are on-device solutions,   which are the easiest to implement. ________________________________________  ⭐ Beginner Tier: On-Device Solutions If you don’t want any new hardware,   you want immediate results, and you don’t  want to have to change router settings,   the beginner tier is for you. The huge upside is that this   protection follows you everywhere -  your phone, your laptop, your tablet.  The downside is that you need to set  it up on each device individually,   and not every device exposes DNS settings. In this tier, I’m partial to solutions that don’t   require you to install another app, so I prefer: NextDNS  • Cloud DNS filtering • Giant blocklist library  • Analytics dashboard • Per-device profiles  • Parental controls • Excellent interface  AdGuard DNS • Prebuilt filtering  • Simple setup If you do want an app,   you can go with a solution like: AdGuard in device mode  • Simple • Effective  • Works on phones, tablets, laptops • Blocks ads + tracking at DNS level  • Doesn’t have any operating  system-level configuration These options are not the only ones in the tier,   but they are probably the most popular and  effective. Competitors include Control D,   CleanBrowsing, Quad9, SafeDNS, DNSFilter,  WebTitan, Cloudflare One, and OpenDNS Home.  The thing you need to know is that there are  free, but limited, tiers for several of these   options. They can have usage or device  limits. Some providers have free trials.  Generally, most people will benefit from  selecting a paid tier, but these solutions   tend to be inexpensive, with the Pro tier  of NextDNS coming in at under $20 a year,   and the “Personal” tier of the Adguard app at  around $31 a year. Those prices are in US dollars.  But remember: Using a third-party DNS provider does not   solve the “ISP spying” problem unless the provider  supports encrypted DNS (DoH, DoT, or DoQ).  And if the site you’re visiting supports ECH –  which is encrypted Client Hello, the ISP won’t   even see the SNI - the part of the handshake that  normally reveals which site you’re connecting to.  Difficulty level? Android, iOS, macOS, Windows,   Linux/BSD, ChromeOS, and many browsers can all be  configured in under 5 minutes. Anyone can do this.  ________________________________________ ⭐ Intermediate Tier: “Easy” Network-Wide Solution  The next tier is the intermediate tier,  and this is for people who want all devices   protected — including Smart TVs, streaming boxes,  consoles, smart speakers, and random IoT nonsense.  The same DNS filtering you used on your  devices can be configured on your router,   instantly covering your entire home network.  The massive benefit is that ALL of your devices   receive the benefits of the ad and tracker  blocking, along with the DNS encryption of DoH,   DoT, or DoQ - assuming it’s supported. There are two notable downsides.  First, you’ll still want on-device config for  portable devices to protect them off-networ.  Second, you have to log into your router to  set the DNS settings. If you’ve done this,   to forward a port, to set a wifi password, or  whatever else – this won’t be a big deal. For   everyone else, this can be kind of difficult. The first thing to do, is to identify the   address of your router. It differs  depending on the device you’re using.  From Windows: 1. you open a command prompt  2. you type ipconfig 3. you look for the Default Gateway   (usually a 10.x.x.x or 192.168.x.x address) 4. you open a web browser and use the IP address   from #3 as the site address 5. you log in using   your router username and password 6. you go to the WAN or Internet settings   and change your DNS server settings the problems are that:  • You forgot the router password (you may have set  up months or years ago and forgotten it, or it may   be printed on a sticker on the router itself). • You can’t find the DNS settings (ask in the   comments - I can help). • You realize your router   is ancient and should be replaced – or you  should load WRT on it (see my video on that). ⭐ Expert Tier: “Hard” Network-Wide Solution The next tier is the expert tier, and this is   also made up of network-wide solutions. The  main difference in this tier is that you’re   hosting the solution yourself. This can be  done in a container, a minimal computer (like   a Raspberry Pi), or even as an app with some  router ecosystems (like pfSense or OPNsense).  The software is free. The hardware is cheap. Also, these solutions are generally more powerful,   flexible, and extensible. The main players are:  Pi-hole The legendary Linux-based ad blocker.  • Runs on Linux and on minimal  hardware, like a Raspberry Pi  • Can run in a container • Uses blocklists  • Protects EVERY device on your network • Highly customizable  • Geek-cred certified AdGuard Home  Like Pi-hole, but: • Easier setup  • Cleaner interface • More built-in features  • Great for beginners While I’d probably say that AdGuard Home is  objectively better, I personally prefer Pi-Hole,   but that’s mostly because I’ve been using  it longer. Generally speaking, though,   there’s not much daylight between  the two, in terms of capabilities.  In terms of setup, both are fairly  straightforward. The most difficult step for   most will probably be setting their router to use  the local blocker as their router’s DNS server.  ________________________________________ ⭐ S-Tier: Self-Hosted Blockers   with Recursive Resolvers This tier takes “trust no one” to the next level.  Pi-hole and AdGuard Home normally act as  DNS forwarders, relying on a third-party   resolver. But what if you don’t want to  trust any public DNS provider at all?  You can run your own recursive  DNS resolver locally:  Your options: • Unbound  • Bind9 • Knot Resolver  They perform the entire DNS  lookup themselves, directly from:  • The Root servers • The TLD servers  • The authoritative servers No Cloudflare.  No Google. No ISP.  No third-party. No logging.  No selling. No profiles.  And it’s relatively easy to combine  Unbound with with Pi-hole or AdGuard Home.  That’s the DNS equivalent of wrapping your entire  house in privacy armor, because it removes every   middleman between you and the DNS system. But why do this at all?  ________________________________________ 🧱 1. No third-party DNS logging  Public DNS providers have… histories. Google logs for analytics.  Cloudflare says they don’t —  but you have to trust them.  Quad9 says they don’t — but also have partners. OpenDNS logs for parental filtering.  When YOU run the resolver: • No logs  • No analytics • No selling  • No subpoena targets Unless you enable   logs… there's nothing to collect. ________________________________________  🕵️ 2. Your ISP sees nothing Your ISP normally sees all DNS requests.  Self-hosted recursion stops this. All your ISP sees is:  • Encrypted traffic • To random IPs  • That they can’t correlate Your browsing behavior becomes invisible*.  SNI still leaks for sites that don’t support  TLS1.3 and ECH, but more sites are supporting it   every month – so, the situation is improving. ________________________________________  🚀 3. Speed - DNS on your own LAN Public DNS is fast.  Local DNS is faster. Caching means:  • First lookup: goes out for resolution • After that: instant  Your entire home feels faster. ________________________________________  🛡️ 4. Almost immune to DNS  poisoning, hijacking, and MITM  Your local resolver can: • Validate DNSSEC  • Avoid ISP-level tampering • Block captive-portal hijacks  • Stop DNS injection used by some ad networks This is real security - not vibes.  ________________________________________ So, Pi-hole / AdGuard Home + Unbound  This gives you: • Filtering  • Local caching • Local recursion  • Zero trust in third parties • Total control  It is the best mixture of convenience, privacy,  and protection available to normal humans.  ________________________________________ Special note  Some devices try to bypass  your DNS settings altogether.  Chromecast, Android TV, and lots of IoT gadgets  ignore DNS servers advertised by DHCP and use   hard-coded resolvers like: • 8.8.8.8  • 1.1.1.1 To stop this, you can:  • Redirect all outbound DNS  traffic to your resolver, or  • Block port 53 and 853 entirely  and force all DNS through your setup  If you’re really into home network  engineering, put all these untrusted devices   on their own VLAN with dedicated firewall rules. You’ll also want to make sure to disable anything   that looks like “DNS relay” or “DNS proxy”. ________________________________________  Request Time! Now that you know what your options are,   it’s time to choose your own adventure.  Do you want an easy tutorial on Pi-Hole,   with or without Unbound, or do you want  one on AdGuard Home, with or without   Unbound? Let me know in the comments below.  If it’s pretty evenly split, I can do both. Conclusion For a “normal” user, DNS is one of   the least-understood pieces of the internet — and  one of the biggest privacy liabilities you have.  Fixing it is like installing a  deadbolt on your digital front door.  Whether you: • Configure NextDNS  • Use AdGuard on your phone • Set up Pi-hole or   AdGuard Home on a Raspberry Pi • Or run your own recursive resolver with Unbound  you are reducing your data trail,  blocking ads, and shutting down   surveillance systems across your entire home. Your DNS provider sees everything you do.  It’s time to make sure that provider is you. And this is as simple as I can make it:   if You Only Do ONE Thing: • If you just want privacy on your   phone/laptop -> Use NextDNS or AdGuard DNS. • If you’re willing to plug in a Raspberry   Pi -> Run Pi-hole or AdGuard  Home and point your router to it.  Everything else in this video is just making  those ideas faster, stronger, and more private. If you got something out of this video, hit  like, subscribe, and tell me in the comments   what setup you’re running, and what you’d  like your setup to look like in the near   future. If you really liked it, please  share this video with people you know.  If you want to support my work, please hype  the video and consider becoming a member.   I’m not a big deal, so it’s REALLY cheap. And speaking of members, I want to thank   new members Linda M., Bryan M.,  and James R. for their support.  Thanks for watching, and  have a great and private day.

Your ISP Is Watching Everything - Fix It With DNS Filtering!

Channel: Dad, the engineer

Convert Another Video

Share transcript:

Want to generate another YouTube transcript?

Enter a YouTube URL below to generate a new transcript.