The enterprise as well. I’m certain many are blindly unaware as this could have 
negative impacts beyond traditional control. 

J~

> On Mar 11, 2020, at 20:43, Owen DeLong <o...@delong.com> wrote:
> 
> 
> 
>> On Mar 11, 2020, at 18:31 , Rubens Kuhl <rube...@gmail.com> wrote:
>> 
>> 
>> 
>>> On Tue, Mar 10, 2020 at 5:30 PM Owen DeLong <o...@delong.com> wrote:
>>> For anyone considering enabling DOH, I seriously recommend reviewing Paul 
>>> Vixie’s keynote at SCaLE 18x Saturday morning.
>>> 
>>> https://www.youtube.com/watch?v=artLJOwToVY
>>> 
>>> It contains a great deal of food for thought on a variety of forms of 
>>> giving control over to corporations over things you probably don’t really 
>>> want corporations controlling in your life.
>>> 
>> 
>> Depends on your threat model: ISPs, Big Tech companies, State-level actors, 
>> random hacker at the same Wi-Fi network. The problem with DoH is that 
>> software developer picks the threat model he or she thinks is most relevant, 
>> and applies to all use cases. 
>> 
>> Solution is to ask user what is the user threat model and apply it. DoH/DoT 
>> are not harmful per se, their indiscriminate usage is. 
>> 
>> 
>> Rubens
>> 
> 
> Yes and no…
> 
> DOH isn’t inherently bad, but every implementation of DOH that I am aware of 
> involves depriving the user of choice and/or control and also depriving 
> network operators of the ability to enforce the “my network, my rules” 
> concept.
> 
> While I realize some may argue that this is desirable in some instances, 
> understand that I’m not talking about the ISP level, but even within the 
> home. Parents should be able to enforce DNS policy on their children, for 
> example. DOH allows the average child to generally bypass any such 
> limitations. Worse, most parents are unlikely to even realize that this is 
> the case.
> 
> Owen
> 

Reply via email to