ISPs Sell DNS Logs to Advertisers β This 2-Minute Fix Kills That
Right now, your internet provider can see every single website every device in your house touches. Changing one setting fixes that.
Think of DNS like a phone book your ISP controls. Every time you type a website address, your device asks βwhatβs the number for this site?β β and your ISP answers that question. Which means they see every question you ask. Every site. Every device. Timestamped.
Thatβs your phone, your TV, your kidβs tablet, your smart fridge β all of it routed through your ISPβs DNS by default. Many ISPs sell this data to advertisers. Some hand it to governments without a fight. And the fix takes about 2 minutes.
π What DNS Actually Is β The 30-Second Version
Every website has a secret address made of numbers (like 142.250.80.46 for Google). Nobody types that. You type google.com, and a DNS server translates that name into the number address so your device can connect.
By default, your internet provider (ISP) IS that translator. Every translation request = one logged entry in their system. Thatβs your browsing history β built automatically, without you doing anything.
| What Your ISP Sees | What That Means |
|---|---|
| Every domain you visit | Full browsing log β not just browser, but every app on every device |
| Exact timestamps | They know when you visited what, down to the second |
| All devices on your network | Phone, laptop, smart TV, gaming console, IoT devices β everything |
| Sellable data | Many ISPs package and sell βanonymizedβ DNS logs to data brokers |
Trick: HTTPS (the lock icon in your browser) encrypts the content of what you see on a website β but NOT the domain name you visited. Your ISP canβt see what you read on Reddit, but they see that you went to Reddit. DNS is the leak.
Changing DNS doesnβt hide your IP address β for that, you need a VPN. But it does three things a VPN doesnβt always do:
- Stops your ISP from logging your domain requests (the biggest privacy win for zero effort)
- Speeds up browsing β most ISP DNS servers are slow and bloated
- Can block malware and ads before your browser even loads them β no extensions needed
π§ Which DNS Should You Pick β Sorted by What You Actually Want
No single DNS is βthe best.β The best one depends on what problem youβre solving. Pick your row:
| Your Priority | Best Pick | Why This One |
|---|---|---|
| Raw speed | Cloudflare 1.1.1.1 | Fastest DNS globally β consistently under 5ms. Set and forget |
| Maximum privacy | Quad9 | Swiss non-profit, Swiss privacy law, strict no-log policy, built-in malware blocking |
| Block malware + phishing | Quad9 or Cloudflare 1.1.1.2 | Blocks known dangerous domains before your browser loads them β like a bouncer for your network |
| Block ads on every device | AdGuard DNS | Ad and tracker blocking at the DNS level β no apps to install, works on every device automatically |
| Family / kids network | CleanBrowsing Family or OpenDNS FamilyShield | Adult content blocked, SafeSearch enforced, zero configuration |
| Full control + analytics | NextDNS | Per-device rules, logs you control, custom blocklists β like running your own Pi-hole without the hardware |
| Simple privacy upgrade | Surfshark DNS | Free, no account needed, no logs, just set the IP and forget it |
| Most reliable / trusted | Google 8.8.8.8 | 100% uptime since forever β when everything else fails, this works |
Trick: Google DNS is the most popular, but Google logs your queries for up to 48 hours and keeps anonymized data indefinitely. Cloudflare purges logs within 24 hours and publishes independent audits. If privacy is the goal, Cloudflare or Quad9 beats Google every time.
π₯οΈ How to Change DNS β Every Platform, Step by Step
Pick your device. Each takes under 2 minutes.
Windows 10 / 11:
- Open Settings β Network & Internet β Wi-Fi (or Ethernet) β click your connection
- Scroll to DNS server assignment β click Edit
- Switch to Manual β turn on IPv4
- Type your chosen DNS addresses (example:
1.1.1.1and1.0.0.1for Cloudflare) - Click Save. Done.
Mac:
- Open System Settings β Network β select your connection β Details β DNS
- Click + and add your DNS addresses
- Click OK. Done.
Android:
- Open Settings β Network & Internet β Private DNS
- Select Private DNS provider hostname
- Type:
one.one.one.one(for Cloudflare) ordns.quad9.net(for Quad9) - Save. Done.
Trick: Androidβs βPrivate DNSβ setting automatically uses DNS-over-TLS β meaning your DNS requests are encrypted. This is better than just changing DNS numbers, because it also prevents your ISP from reading the requests in transit. Use this method, not the manual IP method.
iPhone / iPad:
- Open Settings β Wi-Fi β tap the (i) icon next to your network
- Scroll to Configure DNS β switch to Manual
- Delete existing entries β add your DNS addresses
- Tap Save
Router (protects every device on your network):
- Open your routerβs admin page (usually
192.168.1.1or192.168.0.1in your browser) - Find DNS settings (usually under WAN, Internet, or DHCP settings)
- Replace the DNS addresses with your chosen ones
- Save and reboot the router
Trick: Changing DNS on your router is the power move. One change protects every device that connects to your Wi-Fi β phones, TVs, game consoles, smart home gadgets β without touching each device individually. If you only do one thing from this post, do this.
π Level Up β Encrypt Your DNS (So Your ISP Can't Even See the Requests)
Changing your DNS server is step one. But if you just change the IP addresses without encryption, your ISP can still see the requests β they just canβt answer them anymore. Think of it like changing who you send your postcards to, but the mailman can still read them.
Encrypted DNS puts those postcards in sealed envelopes. Two protocols do this:
| Protocol | How It Works | Best For |
|---|---|---|
| DNS-over-HTTPS (DoH) | Wraps DNS inside normal web traffic on port 443 β looks identical to regular browsing | Personal devices, browsers, hardest to block |
| DNS-over-TLS (DoT) | Dedicated encrypted channel on port 853 β cleaner but easier for networks to block | Routers, Android βPrivate DNSβ, home networks |
How to enable it:
Chrome: Settings β Privacy and Security β Security β scroll to βUse secure DNSβ β pick a provider
Firefox: Settings β Privacy & Security β scroll to DNS over HTTPS β select βMax Protectionβ β pick Cloudflare or NextDNS
Windows 11: When entering DNS in Settings, also enable βDNS over HTTPSβ in the dropdown β Windows 11 supports this natively for Cloudflare, Google, and Quad9
Trick: Firefoxβs DoH is independent from your system DNS. Even if your router uses your ISPβs DNS, Firefox can encrypt its own requests separately. This is useful on networks you donβt control (office, hotel, coffee shop). Enable it and your DNS is invisible to the local network β they literally cannot see which sites you visit.
β Test If It's Working β Prove Your ISP Is Blind
Changed your DNS? Prove it actually took effect:
Step 1 β Go to dnsleaktest.com and click Standard Test
Step 2 β Look at the results. You should see your chosen DNS provider (Cloudflare, Quad9, etc.) β NOT your ISPβs name.
| You See | What It Means |
|---|---|
| Your ISPβs name | DNS change didnβt stick β check your settings again |
| Cloudflare / Quad9 / etc. | Working β your ISP is no longer handling DNS |
| Multiple providers | Possible leak β your system is using fallback DNS alongside your chosen one |
Chrome users: Type chrome://net-internals/#dns in the address bar β look for βSecure DNSβ entries
Firefox users: Type about:networking#dns β check for βTRRβ (Trusted Recursive Resolver) status β if active, DoH is working
Trick: Some ISPs use βtransparent DNS proxiesβ β they intercept port 53 traffic and answer DNS requests themselves, even if you changed the DNS addresses. The fix: enable DoH or DoT (see previous section). Encrypted DNS canβt be intercepted because the ISP canβt read it. If dnsleaktest still shows your ISP after changing DNS numbers, encryption is the answer.
π« What DNS Does NOT Do β Don't Confuse It With a VPN
DNS protects one thing: which websites your ISP sees you requesting. Thatβs it. Important β but limited.
| DNS Fixes This | DNS Does NOT Fix This |
|---|---|
| ISP logging which domains you visit | Hiding your IP address from websites |
| Slow DNS resolution from your ISP | Encrypting your web traffic |
| Malware/ad domains loading (if using a filtering DNS) | Bypassing geo-restrictions |
| DNS-based censorship (in some countries) | Full anonymity |
The layered approach:
- DNS change = stops your ISP from seeing domain requests (free, 2 minutes)
- Encrypted DNS (DoH/DoT) = prevents ISP from even intercepting the requests (free, 5 minutes)
- VPN = hides your IP + encrypts all traffic + bypasses geo-blocks (usually paid)
You donβt need all three. But each layer adds something the others canβt.
Quick Hits
| Want | Do |
|---|---|
β 1.1.1.1 / 1.0.0.1 β Cloudflare, set and forget |
|
β 9.9.9.9 / 149.112.112.112 β Quad9, Swiss non-profit |
|
β 94.140.14.14 / 94.140.15.15 β AdGuard DNS |
|
β 185.228.168.168 / 185.228.169.168 β CleanBrowsing Family |
|
| β NextDNS β free up to 300K queries/month | |
| β dnsleaktest.com β run Standard Test | |
| β Change DNS on your router β covers all devices |
Your ISP has been reading your mail. Time to buy some envelopes.
!