PrivacyGear.nl

Privacy DNS guide — Quad9, Mullvad DNS and DNS-over-HTTPS

Your DNS provider sees every website you visit. Switch from Google or your ISP to a privacy-friendly DNS like Quad9 or Mullvad DNS.

Privacy DNS guide — Quad9, Mullvad DNS and DNS-over-HTTPS

Privacy DNS guide

Every time you visit a website, a DNS request is made — a translation of domain name to IP address. By default this goes through your ISP or Google (8.8.8.8). Those parties log what you request, when, and how often.

A privacy-friendly DNS resolver solves this: no logging, no sale of your query data, and often protection against malware domains too.


What is DNS and why does it matter?

DNS (Domain Name System) is the phone book of the internet. When you type privacygear.nl, your device asks a DNS server: “What is the IP address of privacygear.nl?”

The problem: Your ISP sees all these queries by default. Even if you use HTTPS for the website’s content, the DNS query is visible — unless you use DNS-over-HTTPS or DNS-over-TLS.

What DNS providers see:

  • Which domains you request
  • What time
  • How often
  • From which IP address

In many countries, ISPs can legally sell this data to advertisers.


DNS-over-HTTPS and DNS-over-TLS

Standard DNS travels unencrypted over the network (UDP port 53) — visible to your ISP, router, or anyone monitoring your network.

DNS-over-HTTPS (DoH): DNS queries are sent as HTTPS traffic (port 443). Indistinguishable from normal web traffic. Supported by Firefox, Chrome, Windows 11, Android.

DNS-over-TLS (DoT): DNS queries are encrypted over TLS (port 853). More clearly recognisable as DNS, but also encrypted. Better suited for routers and system-wide configuration.

Which to choose? For browser level: DoH. For system-wide or router: DoT or DoH with system settings.


Quad9 is a non-profit organisation founded by IBM and the Global Cyber Alliance, based in Switzerland (outside EU and US jurisdiction).

Why Quad9:

  • Non-profit — no advertising model
  • Based in Switzerland — strong privacy laws
  • Blocks malware domains via Threat Intelligence feeds
  • No logging of personal data
  • Independently audited

Quad9 addresses:

TypeAddress
IPv49.9.9.9 / 149.112.112.112
IPv62620:fe::fe / 2620:fe::9
DoHhttps://dns.quad9.net/dns-query
DoTtls://dns.quad9.net

Variants:

  • 9.9.9.9 — with malware blocking (recommended)
  • 9.9.9.10 — no blocking, privacy only
  • 9.9.9.11 — with blocking + ECS (slightly faster via geolocation, slightly less private)

Mullvad DNS

Mullvad DNS is the DNS service from Mullvad VPN. Available without using Mullvad VPN too.

Advantages:

  • No logging
  • Optional ad and tracker blocking
  • Based in Sweden

Addresses:

TypeAddress
DoH (no blocking)https://dns.mullvad.net/dns-query
DoH (ad-blocking)https://adblock.dns.mullvad.net/dns-query
DoTtls://dns.mullvad.net

DNS provider comparison

ProviderPrivacyMalware blockingAd blockingOwnerLocation
Quad9✅ GoodNon-profitSwitzerland
Mullvad DNS✅ GoodOptionalMullvad VPNSweden
Cloudflare (1.1.1.1)FairVia 1.1.1.2Via 1.1.1.3Cloudflare Inc.US
Google (8.8.8.8)❌ PoorGoogleUS
NextDNS✅ GoodNextDNS Inc.US
AdGuard DNS✅ GoodAdGuardCyprus

Cloudflare 1.1.1.1 is fast and better than Google, but Cloudflare is a US company. They log minimally but retain data for 25 hours. For serious privacy users: choose Quad9 or Mullvad DNS.


Setting up on different devices

Android

System-wide Private DNS (Android 9+):

  1. Settings → Network → Advanced → Private DNS
  2. Select “Private DNS provider hostname”
  3. Enter: dns.quad9.net

This encrypts all DNS on your Android device, including outside apps.

iOS / iPadOS

iOS has no built-in DoH/DoT setting. Use a configuration profile:

  1. Download the Quad9 profile from quad9.net/service/about
  2. Open in Safari → Settings → Downloaded Profile → Install
  3. Settings → General → VPN & Device Management → Activate the profile

Alternative: use a DNS filtering app like AdGuard for iOS.

Windows 11

  1. Settings → Network & internet → WiFi/Ethernet → Edit
  2. DNS server assignment → Manual
  3. IPv4: 9.9.9.9 and 149.112.112.112
  4. Choose “DNS over HTTPS (automatic template)“

macOS

  1. System Settings → Network → select connection → Details
  2. DNS → + → Add 9.9.9.9 and 149.112.112.112
  3. For DoH/DoT: use a DNS profile or configure via Terminal

Router (OPNsense)

In OPNsense: Services → Unbound DNS → DNS over TLS

Name: Quad9
Server IP: 9.9.9.9
Server Port: 853
Verify CN: dns.quad9.net

Router-wide DNS means all devices on your network are protected, including smart TVs and IoT devices you can’t configure individually.

Firefox

  1. Settings → Privacy & Security → DNS over HTTPS
  2. Enable DNS over HTTPS
  3. Choose “Custom” → https://dns.quad9.net/dns-query

AdGuard Home — self-hosted DNS with blocking

If you have a home server or Raspberry Pi, AdGuard Home is a more powerful option: a local DNS resolver with configurable blocklists.

Advantages over external DNS:

  • All logging stays local
  • Block lists fully customisable
  • Per-device statistics
  • Can forward upstream to Quad9 via DoH/DoT

Installation (Docker):

docker run -d \
  --name adguardhome \
  -p 53:53/tcp -p 53:53/udp \
  -p 3000:3000/tcp \
  -v /opt/adguardhome/conf:/opt/adguardhome/conf \
  -v /opt/adguardhome/work:/opt/adguardhome/work \
  adguard/adguardhome

Navigate to http://[server-ip]:3000 for the configuration wizard.

See also the AdGuard Home review for a complete discussion.


Limits of DNS privacy

DNS encryption solves one problem, but not everything:

What DNS privacy does NOT solve:

  • SNI (Server Name Indication): When connecting to an HTTPS website, the domain name is visible in the TLS handshake, unless Encrypted Client Hello (ECH) is active
  • IP address tracking: Your IP address remains visible to websites you visit
  • Tracking via cookies/fingerprinting: DNS says nothing about what happens afterwards on the website

For complete protection:

  • DNS privacy: Quad9 or Mullvad DNS
  • IP address: VPN (Mullvad, ProtonVPN) or Tor
  • Tracking: uBlock Origin, Firefox + strict mode

DNS privacy is one layer — not a complete solution.


Verification — does it work?

Test whether your DNS setting works:

Browser test:

  • Visit https://1.1.1.1/help — shows which DNS resolver you’re using
  • Visit https://dns.quad9.net/dns-check — Quad9 verification

Command line:

# Check which DNS server you're using
nslookup whoami.akamai.net

# Test Quad9 directly
dig @9.9.9.9 example.com

DNS leak test: Use dnsleaktest.com to verify that your DNS is not leaking through your ISP, including when using a VPN.


Conclusion

Switch today from Google DNS (8.8.8.8) to Quad9 (9.9.9.9). It takes five minutes and your ISP no longer has direct access to your browsing history. Enable DNS-over-HTTPS for encrypted transport.

For home users with a server or Raspberry Pi: AdGuard Home with Quad9 as upstream gives the most control and statistics.

See also: