@93068179 I don't think so. This is just to establish a secure TLS connection.
The public key being intercepted in the unencrypted DNS response is not a concern since it's not meant to be a secret.
Now if one is using plain DNS, all the benefits of ECH are nullified: the adversary can just watch DNS traffic, instead of client hello messages, to figure out where the user is going.
#Google: Here’s a new and easy way for you to share your browsing interests with advertisers.
#Firefox: *rolls out a TLS extension to hide the websites you visit from your ISP and anyone else sniffing your traffic*
See the difference? Choose wisely.
#privacy #googleChrome
#Firefox just announced a new #privacy feature: Encrypted Client Hello (ECH). In short, it encrypts the very first message the browser sends out to initiate an encrypted communication tunnel (TLS channel) with a website.
"ECH uses a public key fetched over the Domain Name System (DNS) to encrypt the first message between a browser and a website, protecting the name of the visited website from prying eyes and dramatically improving user privacy."
https://blog.mozilla.org/en/products/firefox/encrypted-hello/
Notes by 2cdbfee8 | export