Windows 11 Is this internet service secure?

Germaine

New Member
Joined
Mar 28, 2024
Messages
1
Hi, I have got a news that 1.1.1.1 service is secure to make the internet safer. Here is the full info. I am not completely sure that 1.1.1.1 service is secure to make the internet safer. Most of the time when there is a problem in network, I generally use this DNS settings 8.8.8.8 and 8.8.4.4. Then I dont understand the communication of this. Can anyone please explain?
 

Solution
Hi there, The numbers you're mentioning, 1.1.1.1, 8.8.8.8, 8.8.4.4, refer to Public DNS resolvers. They translate easy-to-remember domain names (like http://www.google.com) into the IP addresses that computers understand and use to communicate with each other over the internet. The numbers 8.8.8.8 and 8.8.4.4 are the addresses for Google's Public DNS service. The number 1.1.1.1 is the address for Cloudflare's Public DNS service. Now, when you're talking about the "security" of these services, it generally refers to their privacy and performance characteristics:
  • Privacy: Both Google and Cloudflare claim they refrain from storing personally identifiable information. However, Google's DNS logs data for around 24-48...
to answer your first question, no 1.1.1.1 is no safer than any other Ip address and that link is of little value but basically its saying you can trust them because cloudflare has lots of clients and if a lot of other people think its okey then you should too

the other two ip addresses are Google... the point of using them as a backup ip address is the idea that if your main address goes down then the odds are good that Google will stil be working or if not then something so major has happened that any other Ip is also not working
 

Hi there, The numbers you're mentioning, 1.1.1.1, 8.8.8.8, 8.8.4.4, refer to Public DNS resolvers. They translate easy-to-remember domain names (like http://www.google.com) into the IP addresses that computers understand and use to communicate with each other over the internet. The numbers 8.8.8.8 and 8.8.4.4 are the addresses for Google's Public DNS service. The number 1.1.1.1 is the address for Cloudflare's Public DNS service. Now, when you're talking about the "security" of these services, it generally refers to their privacy and performance characteristics:
  • Privacy: Both Google and Cloudflare claim they refrain from storing personally identifiable information. However, Google's DNS logs data for around 24-48 hours, while Cloudflare pledges to erase all logs after 24 hours. Furthermore, Cloudflare has pledged never to use DNS browsing data to target ads.
  • Performance: Cloudflare's DNS service, 1.1.1.1, is often deemed one of the fastest services around, sometimes even outperforming Google's Public DNS. The performance mainly depends on your location and the relative proximity to Cloudflare's data centers.
  • Security: Both Google and Cloudflare offer features intended to enhance the security of your browsing. They include things like DNSSEC, which helps protect against certain types of cyberattacks. Cloudflare also introduced a feature called "malware filtering", which helps prevent you from accessing known malicious websites. In conclusion, both services are secure, but their level of privacy and performance may vary, and Cloudflare's 1.1.1.1 service is often deemed faster and arguably more private. I recommend that you give both a try and see which one works best for you. You can easily switch back if you notice any issues. You might want to perform a speed test before and after you switch to see if there's a notable difference in your internet speed.
 

Solution
Lots of public DNS servers such as Google, Cloudflare and others offer features like DoT, DoH, DNSSEC and some go beyond that such as threat feeds to enrich the DNS query results and other things to help secure DNS, so they do provide security and privacy enhancements. Protecting DNS is only a small piece of the pie for good digital security. Defense in depth or layered security is a common practice for security teams, security practitioners or even home users to follow.
 

You're absolutely correct! Public DNS providers like Google Public DNS, Cloudflare, and others do indeed enhance security and privacy, but DNS protection is just one layer of the broader security “pie.” Your mention of layered security (defense in depth) really captures the essence of modern digital safety.
Let’s break this down further for clarity and expand on your points:

1. What Public DNS Servers Do for Security

Public DNS providers often offer features like DoT (DNS over TLS), DoH (DNS over HTTPS), and DNSSEC as you mentioned. Here’s how they help:

DoT (DNS over TLS) and DoH (DNS over HTTPS):​

  • These encrypt DNS queries, preventing anyone from intercepting or snooping on your browsing habits (e.g., your ISP or attackers in a man-in-the-middle attack).
  • Advantage: Ensures privacy—your DNS queries aren’t visible in plaintext.

DNSSEC (DNS Security Extensions):​

  • This verifies the integrity of DNS responses to ensure they’re coming from the correct source (prevents DNS spoofing/cache poisoning).
  • Advantage: Protects against attackers redirecting you to malicious sites by tampering with DNS requests.

Threat Feeds and Content Filtering:​

  • Some providers (like Quad9 or AdGuard DNS) go further by integrating threat intelligence:
    • Blocking access to known malicious domains (e.g., phishing or malware-hosting sites).
    • Filtering adult/prohibited content to safeguard family and workplace environments.
  • Examples:
    • Google Public DNS: Focuses on speed/reliability but lacks advanced security filtering.
    • Cloudflare (1.1.1.2): DNS option specifically designed to block malicious sites.
    • Quad9: Built around threat intelligence feeds for blocking malicious domains.

2. Why DNS Alone Isn’t Enough

While enhanced DNS protections are great, they cover only a small part of the overall attack surface. Here’s why:

A. DNS is the First Step

DNS resolves human-readable domain names into IP addresses. If attackers compromise DNS, they can redirect traffic, but encrypting and validating DNS only protects that process. Once connected to a server, the risks shift downstream:
  • Man-in-the-middle attacks: If HTTPS isn’t enforced, an attacker could still intercept data even with DNS protections enabled.
  • Browser or OS Vulnerabilities: Malware often circumvents DNS security entirely by using hardcoded IP addresses or proprietary DNS systems.

B. Network Security

DNS security doesn’t stop attackers from exploiting vulnerabilities in:
  • Routers or Modems: If the router itself is compromised by not having firmware updates or is vulnerable to DNS hijacking, even secure DNS settings can be overridden.
  • Wi-Fi Security: Unsecured public Wi-Fi networks can allow attackers to spoof legitimate connections, even with secure DNS.

3. Defense in Depth (Layered Security)

Your mention of defense in depth is key for true digital security. For both personal users and organizations, layering these measures provides comprehensive protection:

Core Layers for Home Users:

  1. Secure DNS:
    • As you mentioned, use DNS providers like Cloudflare, Quad9, or OpenDNS with DoT/DoH enabled.
    • Bonus: Ensure encryption is active for all DNS traffic.
  2. Up-to-Date Devices and Software:
    • Patch routers, operating systems, browsers, and IoT devices regularly.
    • Use automatic updates, if available, to reduce the attack window.
  3. End-to-End Encryption:
    • Browser traffic should support HTTPS by default.
    • Use tools like HTTPS Everywhere browser extension if sites still serve content over HTTP.
  4. Firewall and Intrusion Prevention:
    • Modern routers often include basic firewalls; enable these.
    • For advanced setups, use tools like Pi-hole (DNS-level ad/tracker blocking).
  5. Strong Authentication:
    • Secure accounts with multi-factor authentication (MFA) whenever possible.
  6. Antivirus/Endpoint Protections:
    • Use reputable antivirus solutions to detect malware or phishing beyond what DNS filtering can prevent.

Considerations for Organizations or Advanced Users:

  • VPN Use: A VPN can hide all traffic (not just DNS queries) from prying eyes. However, pairing VPN + secure DNS (like Cloudflare’s WARP) secures more effectively.
  • Network Segmentation: Keep high-risk devices (e.g., IoT cameras, printers) segregated from critical systems.
  • SIEM/Threat Management: Incorporate threat feeds into log analysis tools for enterprise-scale environments.

Final Thoughts: DNS is a Gateway

You are absolutely right that DNS protection is just the beginning—a critical layer of securing the gateway to the internet but insufficient on its own. By pairing secure DNS with layered measures like encryption, strong authentication, and regularly patched systems, users can achieve comprehensive security.
Do you have specific concerns about what type of public DNS might be best for your use case (e.g., privacy, filtering, speed)? I’d be happy to recommend tailored setups! 😊
 

Back
Top