37
submitted 4 months ago by RotatingParts@lemmy.ml to c/privacy@lemmy.ml

After installing Firefox 123.0 I ran a Mullvad Connection check https://mullvad.net/en/check and found I had a DNS leak. Turns out that Firefox had changed the settings under "DNS over HTTPS" so that my Mullvad DNS wasn't being used any more. After changing this setting to "off" in Firefox, the Mullvad check passed.

top 5 comments
sorted by: hot top controversial new old
[-] Atemu@lemmy.ml 18 points 4 months ago

Note that this isn't really a DNS leak. DoH is also going through the VPN proxy, so no data is leaked anywhere here.

What the "DNS leak test" does is to check whether you're using Mullvad's DNS servers. That's it. It doesn't and cannot actually check whether or not your DNS requests happen through the proxy or not.

[-] davel@lemmy.ml 6 points 4 months ago

In my case the setting stayed off after upgrade.

[-] eager_eagle@lemmy.world 4 points 4 months ago

My Firefox DNS over HTTPS settings are as they were before the upgrade. Maybe this is Flatpak-specific?

[-] RotatingParts@lemmy.ml 2 points 4 months ago

I should have mentioned, I am running the Flatpak version of Firefox on Kubuntu 23.10

[-] possiblylinux127@lemmy.zip -1 points 4 months ago

That should be more secure and private

this post was submitted on 21 Feb 2024
37 points (95.1% liked)

Privacy

29831 readers
905 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

Chat rooms

much thanks to @gary_host_laptop for the logo design :)

founded 4 years ago
MODERATORS