├── .gitignore ├── CNAME ├── Gemfile ├── README.md ├── _config.yml ├── config.json ├── dohdot.md ├── getapp.md ├── index.md ├── mac_logo.png ├── policy.md └── tutorial.md /.gitignore: -------------------------------------------------------------------------------- 1 | _site 2 | .bundle 3 | -------------------------------------------------------------------------------- /CNAME: -------------------------------------------------------------------------------- 1 | dns-security.peterlee.app -------------------------------------------------------------------------------- /Gemfile: -------------------------------------------------------------------------------- 1 | source 'https://rubygems.org' 2 | 3 | gem "github-pages", group: :jekyll_plugins 4 | 5 | 6 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # DNS Security 2 | 3 |
4 | 5 | #### The First app uses iOS 14 new feature DNS over HTTPS or DOT without installing any VPN config!! 6 | Secure your DNS query without touch your network connection. 7 | 8 | ### Do you know? What's DNS over HTTPS/TLS? 9 | 10 | Even if you are visiting a site with HTTPS, your DNS query is sent over an unencrypted connection. That means that even if you are viewing any website with HTTPS. Anyone listening to packets on the network still can know you are visiting some websites. It is easy for a Man-In-The-Middle to change DNS answers to route unsuspecting visitors to their phishing, malware, or surveillance site with unencrypted DNS. Your ISP, router, the network provider may have the ability to track you. So. here comes DNS over HTTPS or DNS over TLS to secure the DNS query. 11 | 12 | ### Feature 13 | This app uses the iOS 14 new feature DNS over HTTPS and DNS over TLS. 14 | The First app has DNS over HTTPS and DNS over TLS without any VPN config. Install any VPN that may send your all network connection to the server. 15 | 16 | ### Privacy 17 | This app only secures your DNS query with a trust service provider. It doesn't send your other connection to any server. We don't collect any information!! 18 | 19 | ### Transparent 20 | Choose the provider that you trust. 21 | You can choose Google, Cloudflare, AdGuard, and other service providers 22 | 23 | 1. DNS over HTTPS(DOH) uses port 443, like your HTTPS connection. 24 | 2. DNS over TLS(DOT) uses port 853. 25 | 26 | 27 | You may need to follow steps to enable DNS settings. 28 | 1. Enable the toggle switch in the app. 29 | 2. Go to iPhone - Settings - General - VPN & Network - DNS - Select "DNS Security" 30 | 31 | If you got a connection problem with this app, please try to select other config profiles or try to re-enable the app. Some service providers may unavailable in your area. 32 | 33 | If you have any suggestions, you can leave a review for us. We will continue to make this app better. 34 | 35 | 36 | ## Pro 37 | Download on the App Store 38 | 39 | ## Lite 40 | Download on the App Store 41 | -------------------------------------------------------------------------------- /_config.yml: -------------------------------------------------------------------------------- 1 | title: DNS Security for iOS 2 | description: The First app with DNS over HTTPS/TLS in iOS 14. 3 | theme: jekyll-theme-midnight 4 | -------------------------------------------------------------------------------- /config.json: -------------------------------------------------------------------------------- 1 | { 2 | "config":[ 3 | { 4 | "name": "cloudflare-DOT", 5 | "servers": [ "1.1.1.1", "1.0.0.1", "2606:4700:4700::1111", "2606:4700:4700::1001" ], 6 | "serverName": "cloudflare-dns.com", 7 | "group": "cloudflare" 8 | }, 9 | { 10 | "name": "cloudflare-DOH", 11 | "servers": [ "1.1.1.1", "1.0.0.1", "2606:4700:4700::1111", "2606:4700:4700::1001" ], 12 | "serverName": "https://1.1.1.1/dns-query", 13 | "group": "cloudflare" 14 | }, 15 | { 16 | "name": "cloudflare-malware-DOH", 17 | "servers": [ "1.1.1.2", "1.0.0.2", "2606:4700:4700::1112", "2606:4700:4700::1002" ], 18 | "serverName": "https://security.cloudflare-dns.com/dns-query", 19 | "group": "cloudflare" 20 | }, 21 | { 22 | "name": "cloudflare-adult-malware-DOH", 23 | "servers": [ "1.1.1.3", "1.0.0.3", "2606:4700:4700::1113", "2606:4700:4700::1003" ], 24 | "serverName": "https://family.cloudflare-dns.com/dns-query", 25 | "group": "cloudflare" 26 | }, 27 | { 28 | "name": "google-DOT", 29 | "servers": [ "8.8.8.8", "8.8.4.4", "2001:4860:4860::8888", "2001:4860:4860::8844"], 30 | "serverName": "dns.google", 31 | "group": "google" 32 | }, 33 | { 34 | "name": "google-DOH", 35 | "servers": [ "8.8.8.8", "8.8.4.4", "2001:4860:4860::8888", "2001:4860:4860::8844"], 36 | "serverName": "https://dns.google/dns-query", 37 | "group": "google" 38 | }, 39 | { 40 | "name": "AdGuard-DOH", 41 | "servers": [ "94.140.14.14", "94.140.15.15", "2a10:50c0::ad1:ff", "2a10:50c0::ad2:ff"], 42 | "serverName": "https://dns.adguard.com/dns-query", 43 | "group": "adguard" 44 | }, 45 | { 46 | "name": "AdGuard-DOT", 47 | "servers": [ "94.140.14.14", "94.140.15.15", "2a10:50c0::ad1:ff", "2a10:50c0::ad2:ff"], 48 | "serverName": "dns.adguard.com", 49 | "group": "adguard" 50 | }, 51 | { 52 | "name": "Quad9-DOH", 53 | "servers": ["9.9.9.9", "149.112.112.112", "2620:fe::fe", "2620:fe::fe:9"], 54 | "serverName": "https://dns.quad9.net/dns-query", 55 | "group": "quad9" 56 | }, 57 | { 58 | "name": "Chunghwa Telecom Hinet(Taiwan)-DOH", 59 | "servers": ["168.95.192.1", "168.95.1.1"], 60 | "serverName": "https://dns.hinet.net/dns-query", 61 | "group": "cht" 62 | }, 63 | { 64 | "name": "twnic (Taiwan)-DOT", 65 | "servers": ["101.101.101.101"], 66 | "serverName": "", 67 | "group": "twnic" 68 | }, 69 | { 70 | "name": "Pi-dns (West USA)-DOH", 71 | "servers": ["45.67.219.208", "2a04:bdc7:100:70::abcd"], 72 | "serverName": "https://doh.westus.pi-dns.com/dns-query", 73 | "group": "pi-dns" 74 | } 75 | ] 76 | } 77 | -------------------------------------------------------------------------------- /dohdot.md: -------------------------------------------------------------------------------- 1 | ## DNS over HTTPS 2 | 3 | **DNS over HTTPS** (**DoH**) is a protocol for performing remote [Domain Name System](https://en.wikipedia.org/wiki/Domain_Name_System) (DNS) resolution via the [HTTPS](https://en.wikipedia.org/wiki/HTTPS) protocol. A goal of the method is to increase user privacy and security by preventing eavesdropping and manipulation of DNS data by [man-in-the-middle attacks](https://en.wikipedia.org/wiki/Man-in-the-middle_attacks)[[1\]](https://en.wikipedia.org/wiki/DNS_over_HTTPS#cite_note-register-1) by using the HTTPS protocol to [encrypt](https://en.wikipedia.org/wiki/Encrypt) the data between the DoH client and the DoH-based [DNS resolver](https://en.wikipedia.org/wiki/DNS_resolver). 4 | 5 | ## DNS over TLS 6 | 7 | **DNS over TLS** (**DoT**) is a [security protocol](https://en.wikipedia.org/wiki/Security_protocol) for encrypting and wrapping [Domain Name System](https://en.wikipedia.org/wiki/Domain_Name_System) (DNS) queries and answers via the [Transport Layer Security](https://en.wikipedia.org/wiki/Transport_Layer_Security) (TLS) protocol. The goal of the method is to increase user privacy and security by preventing eavesdropping and manipulation of DNS data via [man-in-the-middle attacks](https://en.wikipedia.org/wiki/Man-in-the-middle_attacks). 8 | 9 | -------------------------------------------------------------------------------- /getapp.md: -------------------------------------------------------------------------------- 1 | 4 | -------------------------------------------------------------------------------- /index.md: -------------------------------------------------------------------------------- 1 | # DNS Security 2 | 3 |
4 | 5 | #### The First app uses iOS 14 new feature DNS over HTTPS or DOT without installing any VPN config!! 6 | Secure your DNS query without touch your network connection. 7 | 8 | ### Do you know? What's DNS over HTTPS/TLS? 9 | 10 | Even if you are visiting a site with HTTPS, your DNS query is sent over an unencrypted connection. That means that even if you are viewing any website with HTTPS. Anyone listening to packets on the network still can know you are visiting some websites. It is easy for a Man-In-The-Middle to change DNS answers to route unsuspecting visitors to their phishing, malware, or surveillance site with unencrypted DNS. Your ISP, router, the network provider may have the ability to track you. So. here comes DNS over HTTPS or DNS over TLS to secure the DNS query. 11 | 12 | ### Feature 13 | This app uses the iOS 14 new feature DNS over HTTPS and DNS over TLS. 14 | The First app has DNS over HTTPS and DNS over TLS without any VPN config. Install any VPN that may send your all network connection to the server. 15 | 16 | ### Privacy 17 | This app only secures your DNS query with a trust service provider. It doesn't send your other connection to any server. We don't collect any information!! 18 | 19 | ### Transparent 20 | Choose the provider that you trust. 21 | You can choose Google, Cloudflare, AdGuard, and other service providers 22 | 23 | 1. DNS over HTTPS(DOH) uses port 443, like your HTTPS connection. 24 | 2. DNS over TLS(DOT) uses port 853. 25 | 26 | 27 | You may need to follow steps to enable DNS settings. 28 | 1. Enable the toggle switch in the app. 29 | 2. Go to iPhone - Settings - General - VPN & Network - DNS - Select "DNS Security" 30 | 31 | If you got a connection problem with this app, please try to select other config profiles or try to re-enable the app. Some service providers may unavailable in your area. 32 | 33 | If you have any suggestions, you can leave a review for us. We will continue to make this app better. 34 | 35 | 36 | ## Pro 37 | Download on the App Store 38 | 39 | ## Lite 40 | Download on the App Store 41 | 42 | -------------------------------------------------------------------------------- /mac_logo.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/peterlee0127/DNS-Security-iOS/3b972616d4ca3d7285e4a60d45be78e7b1e51139/mac_logo.png -------------------------------------------------------------------------------- /policy.md: -------------------------------------------------------------------------------- 1 | **Privacy Policy** 2 | 3 | peterlee built the DNS Security app as one time paid iOS app. 4 | 5 | The terms used in this Privacy Policy have the same meanings as in our Terms and Conditions, which is accessible at DNS Security unless otherwise defined in this Privacy Policy. 6 | 7 | **Information Collection and Use** 8 | 9 | I don't collection any information. No matter the device or user information. 10 | 11 | **Changes to This Privacy Policy** 12 | 13 | I may update our Privacy Policy from time to time. Thus, you are advised to review this page periodically for any changes. I will notify you of any changes by posting the new Privacy Policy on this page. 14 | 15 | This policy is effective as of 2020-10-03 16 | -------------------------------------------------------------------------------- /tutorial.md: -------------------------------------------------------------------------------- 1 | Tutorial --------------------------------------------------------------------------------