E24 did you use DNS over TLS?
Next DNS
I think it was over https. What's the difference?
Nvm I am using TLS but its not working
It continuously disconnects from the internet and when I look at my account it says my phone is set connect or whatever even though I'm using the TLS address
E24 "or whatever"
Go to settings > network and internet > private DNS > private DNS provider hostname > enter the DNS over TLS domain from your nextDNS setup portal.
Lolsrslybro I did. Could it be a problem with proton VPN?
As long as you didn't download the NextDNS app. I don't see it being a problem. If your VPN is on a kill switch and it goes down, it will cut connectivity to NextDNS.
What error message are you getting exactly?
It says " network has no access, private DNS server could not he accessed"
[deleted]
- Edited
E24 What network are you on? Are connectivity checks enabled?
They are enabled and I'm just on the dorm WiFi
[deleted]
E24 And over mobile data it's the same?
Lte doesnt work either I have to turn off DNS
[deleted]
E24 Have you tried isolating the issue (by removing the VPN from the equation for example)? Why do you even need both? These two don't complement each other very well and make you stand out like a sore thumb.
Which one is better? I haven't tired that yet maybe its the issue.
- Edited
[deleted]
- Edited
E24 Depends on what you're trying to achieve but VPN with content filtering is best of both words (eg NetShield for ProtonVPN, IVPN AntiTracker, Ad-blocking and tracker-blocking DNS service etc).
In case you're missed discussion from a couple of days ago.
- Edited
They do two different things. In not a matter of which one is better, it depends on what you're trying to accomplish.
The VPN hides your true IP address, it does your DNS request, and it encrypts your traffic.
What you're doing is using nextDNS to handle the DNS requests instead of your VPN. Running the VPN still encrypts the traffic and hides your real IP (people will only see the IP of the VPN server you're connected to). Its just not handling your DNS requests now.
If you use no VPN or DNS service, then people see your true IP address, your data is not encrypted, and your ISP (internet service provider) handles your DNS request, which means your ISP is seeing what you're doing.
The perk of nextDNS is that you have more control over blocklists/firewall settings (things you can't change in some VPN's). The real perk is that you can view live logs and block telemetry, which you can't do with your VPN (I'll assume). This is done by enabling logs, and watching a live feed of domains that are making connections and blocking what you don't want to connect (excess telemetry, tracking, etc).
Its not bad to use your VPN to handle DNS requests, but it won't allow you to set specific blocks.
I believe what @Ddismount2784 is referring to, is the more specific you make security settings, the easier you are to fingetprint. E.g., this person (although we don't know who they are) is doing this, and we can tell because they connect with very specific settings that are specific to them (browser settings, VPN/DNS settings, etc) (dismount correct me if I'm wrong).
[deleted]
Lolsrslybro Just a wild guess the OP read some reddit post somewhere recommending both for no good reason.
- Edited
[deleted] fair enough, I mentioned you in the above comment. That's what you're referring to regarding fingerprinting right? I'm no expert on this shit.