How to browse privately and without ads using a private DNS

  • A secure DNS encrypts requests and reduces the ability of your provider and public networks to spy on or manipulate the websites you visit.
  • Services like AdGuard DNS or Cloudflare allow you to filter ads, trackers, and adult content at the system level, not just in the browser.
  • Android 9 and later versions integrate a private DNS setting that makes it easy to use trusted DoH/DoT servers without installing extra apps.
  • Combining secure DNS with VPN, blockers like Brave, and well-configured security solutions significantly increases online privacy.

How to browse privately and without ads using a private DNS

If you're tired of being bombarded with ads everywhere and increasingly concerned about your privacy when you're online from your mobile device, using a Private DNS can be a simple and very powerful solutionYou don't need to be a computer expert: with a few adjustments you can filter ads, gain some speed, and make it harder for your internet provider and trackers to follow your every move online.

In the latest versions of Android, and with the help of certain external services such as Cloudflare, AdGuard, or other DNS providers, it is possible browse more privately, reduce banners and pop-ups, and limit tracking on apps and websitesLet's take a look, calmly and without unnecessary technical jargon, at exactly what a private DNS or secure DNS is, what advantages and disadvantages it has, how to configure it on your Android mobile, and what alternatives exist in other systems and browsers.

What is DNS and why does it affect your privacy?

To understand why a private DNS can help you, you first need to be clear on what DNS is and what it does exactly when you browse the internet. DNS (Domain Name System) is like the contact list of the Internet: translates human-readable addresses (e.g., kaspersky.es) into numerical IP addresses (such as 185.85.15.34) that servers and routers understand.

Almost every connection you make—opening a website, an app querying a server, loading a video—begins with a DNS request. In practice, Your device asks a DNS server which IP address corresponds to the domain you want to visit.By default, that DNS server is usually the one from your Internet provider (mobile operator, fiber, etc.), unless you change it manually.

The problem is that These traditional DNS requests are neither encrypted nor signed.This means they are relatively easy to intercept, manipulate, or record. Your internet service provider can see which domains you visit, build a profile about you, and use it for targeted advertising or to implement blocks and redirects. And it's not just your provider: anyone who controls the network you connect to (for example, public Wi-Fi in a hotel or airport) can manipulate that traffic.

I'm sure you've connected to a free Wi-Fi network before and, instead of the page you wanted to open, a [unclear - possibly a website or advertisement] popped up. welcome page, advertising, or login formThis is done by modifying the DNS response so that, instead of the requested site, a different website loads. Cybercriminals can use the same technique to display fake websites that distribute malware or steal banking information.

This DNS address replacement system is also used, with good intentions, in parental control services that block certain types of contentThe drawback is that it's not very precise: often it blocks the entire domain (for example, all of youtube.com) instead of filtering only the problematic pages or videos, which can be too aggressive.

Public DNS, private DNS, and secure DNS

The good news is that You are not required to use your provider's DNS.There are many public DNS servers managed by reputable companies, such as Google (8.8.8.8) or Cloudflare (1.1.1.1), and also specialized services like AdGuard, which add extra filtering features.

Strictly speaking, when we talk about Private DNS We're simply referring to a DNS server that isn't publicly accessible, but rather managed privately (by a company, an advanced user, an organization, etc.). Therefore, private DNS doesn't automatically mean "more privacy": the only difference is who receives and manages your requests.

In practice, however, the expression "private DNS" is often used to refer to Secure DNS, that is, DNS that uses encryption protocolsAndroid, for example, calls the option that enables the use of these protocols "Private DNS" since version 9 (Pie). Technically, the most accurate term would be Secure DNS, but in the system menus you'll find the option listed as Private DNS.

The main standards of Secure DNS includes DoH, DoT, and DNSCrypt.:

  • DNS over HTTPS (DoH)DNS queries travel encrypted within normal HTTPS traffic, the same traffic used by secure websites (port 443). This makes it more difficult for a restrictive provider to block or filter.
  • DNS over TLS (DoT)The requests are encrypted using TLS, but are sent through a specific port for secure DNS (853). This also protects the query content from eavesdropping.
  • DNSCrypt: an alternative protocol that encrypts and authenticates DNS traffic, less widespread than DoH or DoT but still used by some services.

What's important for you as a user is that, if your mobile phone, browser or operating system supports any of these protocolsYou can set up a compatible DNS server and have all (or part) of your domain name queries travel encrypted, reducing the risk of spying or manipulation.

DNS filtering to block ads and trackers

In addition to encryption, some providers offer DNS that act as ad filters, trackers, and unwanted contentThe process is relatively simple: the DNS server maintains a list of domains associated with advertising, tracking, malware, adult content, etc. When your device tries to resolve one of these domains, the filtering DNS returns a fake address or simply doesn't respond, so the ad or tracking script never loads.

A very popular example is AdGuard DNSwhich offers several types of servers:

  • Default serversThey block ads and trackers in browsers and apps, reducing much of the intrusive advertising.
  • Non-filtering serversThey respond to all requests without blocking anything, designed for those who only want to use AdGuard's DNS infrastructure but without filters.
  • Family protection serversIn addition to ads and trackers, they block adult content and activate features like SafeSearch or Safe Mode whenever possible, designed for devices used by minors.

By using this type of filtering DNS, Ads stop loading at the system level, not just in the browserThis means that many apps that rely on advertising networks will see a significant reduction in their banners and pop-ups. On budget phones, where every resource counts, this translates into smoother navigation and fewer interruptions when playing multimedia content.

It is important to understand, however, that Not all ads disappear, nor are all trackers blocked.Some are loaded embedded in ways that are harder to filter from DNS, and there's always some room for evasion. Even so, the noise reduction is usually very significant without needing to install additional blocking applications.

Risks and limitations of private DNS

How to browse privately and without ads using a private DNS

Alongside the advantages, there are also aspects you should consider before changing your settings. When you activate a private or secure DNS, All your domain resolution activity goes through a third partyIn other words, you replace your operator with the DNS provider you have chosen, which from that moment on has visibility over which domains you visit.

That's why choosing is fundamental a trusted provider with clear privacy policies and a good reputationCompanies like Cloudflare, Google, AdGuard, and other security services have long been under public scrutiny and often publish documentation about what data they retain, for how long, and for what purpose. Even so, there's always a degree of implicit trust: no one can guarantee 100% what happens internally.

Another important point is that Simply changing the DNS address to 1.1.1.1 or 8.8.8.8 does not solve all privacy problems.If you only replace the operator's DNS with a public DNS without enabling encryption (DoH, DoT, etc.), an intruder with control over the local network (for example, on an unsecured Wi-Fi) could still intercept or block your requests, or prevent you from accessing an external DNS by forcing the use of their own.

Even when you enable secure DNS, Privacy is never completeThe DNS sees which domains you resolve (though not which exact pages within a domain you visit), but many online services can still track you through cookies (learning to delete cookies on your Android), browser fingerprints or other methods, and your Internet provider still sees the IP ranges you connect to, although not always the original domain.

Finally, you should keep in mind that Some services, websites, or applications may stop working correctly if filtering DNS blocks necessary domains.In most cases, this can be resolved by adding exceptions or switching to a non-filtering server, but it's good to know that it can happen.

Practical advantages of using a private DNS on your mobile phone

Beyond theory, using a well-chosen private DNS provides a number of very concrete benefits in everyday use. To begin with, It can improve your privacy from the operator and certain public networks.Since many domain requests are encrypted and not so easy to spy on or manipulate. If you also want measures for hide IPCombining secure DNS and other tools helps reduce exposure.

If you choose a specialized DNS service like AdGuard or similar, You also gain a system-level ad and tracker filterThis translates to fewer banners, fewer pop-ups, and fewer tracking scripts, both in the browser and within many applications that use standard ad networks.

Another benefit is that Some DNS servers are highly optimized to respond faster than those of many carriers.If the service you choose has a well-distributed infrastructure, you'll notice some speed when loading websites and online services, especially when your current DNS is slow or unreliable.

There is also a convenience advantage: Configuring private DNS on Android ensures that choice is saved in the system backup.This way, when you change your mobile phone or restore your account, it's very likely that the same private DNS will be reapplied without you having to re-enter it, greatly simplifying maintenance.

For those with children at home, use DNS profiles with family protection allow you to put an initial filter on adult content. without having to install so many additional apps. It's not perfect parental control, but it is a useful complement within a broader set of measures.

How to set up a private DNS on Android 9 or higher

Since Android 9 (Pie), Google has included a specific option to configure a private or secure DNS in the system, so you don't depend on each Wi-Fi network or third-party apps. The process is very similar on most phones, although The exact names of the menus may vary slightly depending on the brand..

The general steps to activate a private DNS on Android are these:

  • Open the Settings app on your Android phone and enter the section related to networks, connections or the Internet.
  • Look for a submenu with names like “More connection settings”, “More connections”, “Advanced settings” or something similar. Each manufacturer arranges this block in their own way.
  • Within that group of options, locate the section called “Private DNS” and access it.
  • Select the “Private DNS provider hostname” mode (or similar) and enter the secure DNS server domain name you want to useImportant: Android here does not accept numeric addresses like 1.1.1.1; you must enter the domain provided by your provider (for example, 1dot1dot1dot1.cloudflare-dns.com for Cloudflare, dns.adguard.com for AdGuard, etc.).
  • Save the changes and exit the settings. In a few seconds, All phone connections using DNS will go through that private server while the option is enabled.

If you have a Xiaomi phone and don't see the private DNS setting in the menus, there's a common trick: Use the search bar at the top of Settings and type “Private DNS”If it still doesn't appear, you can use apps like "Hidden Settings for MIUI", which allow access to internal settings that the manufacturer has hidden from the main view.

Once activated, the change affects all the networks you use, both Wi-Fi and mobile data, which is very convenient. If at any point you want Use private DNS only on a case-by-case basis (for example, when you're going to use a specific app or connect to a dubious public Wi-Fi network), you can enter the same menu and temporarily disable it or change servers in a matter of seconds.

Examples of private and filtering DNS servers

There is a long list of DNS services available, but some names stand out for their popularity and ease of configuration. For example, Cloudflare offers very fast public DNS with DoH and DoT supportThese are accessible via 1.1.1.1 and specific domains for secure DNS. Google also maintains its DNS servers 8.8.8.8 and 8.8.4.4, with versions compatible with encrypted protocols.

In the area of ​​ad blocking, AdGuard DNS is one of the best-known optionsIt offers specific addresses for its default, non-filtering, family-friendly servers. On many devices, simply entering dns.adguard.com or other names documented by the service itself is enough to activate filtering.

If you have more advanced knowledge or a small home server, you can go a step further by installing AdGuard Home or other similar solutions on your own networkThis way you create a local DNS under your control, with custom blocklists, usage statistics, and rules specific to your environment. This type of installation is more complex, but it gives you a huge degree of flexibility.

In GNU/Linux systems like Ubuntu or Debian, manually changing the DNS usually involves editing files such as / Etc / resolv.conf You can also adjust the NetworkManager settings, or even restart the network with commands like `/etc/init.d/networking restart` to apply the changes. In a home setting, however, it's usually more practical to configure the DNS directly on the router or mobile device.

Whichever route you choose, the key is Enter the correct DNS server addresses provided by your trusted service. and be clear about what type of filtering or logging they perform. Many providers have step-by-step guides for each operating system, which greatly simplifies the process.

Secure DNS, VPN and their relationship

Many people use a VPN thinking that this solves all their privacy issues, but the reality is a bit more nuanced. VPN and secure DNS are complementary technologiesNo substitutes. If you need practical instructions, here's a guide on how to use a VPN on mobile phone which clarifies many concepts.

When you activate a VPN, in theory All your traffic is encrypted and sent through a tunnel to the VPN serverwhich then forwards it to the Internet. However, in some cases, DNS requests may still go out through an unencrypted channel or using the system's DNS, leaving them exposed to the same usual risks: espionage, manipulation, blocking, etc.

Some commercial VPN services do include their own encrypted DNS servers integrated into the connection profileSo everything goes inside the VPN tunnel and is resolved within its infrastructure. Others allow you to manually select a secure DNS within the application itself. But this isn't always the case; that's why it's a good idea to carefully read your provider's documentation or ask their technical support.

If your VPN doesn't offer protected DNS, or doesn't make it clear, you can opt for Enable a secure DNS independently in the system or in the browserThis ensures that both the VPN and the DNS channel are encrypted. This adds an extra layer of protection, especially on networks that might try to block external DNS servers.

Overall, using a VPN + secure DNS greatly increases your privacy, but it doesn't make you invisible. The services you visit can still track you through other means.And your internet provider still sees that you're using a VPN, although not the details of what you're doing inside it.

How to enable secure DNS on other systems and browsers

Although this article focuses on Android, almost all modern platforms already offer some form of Enable secure DNS using DoH or DoTIn the Apple ecosystem, for example, iOS 14 and macOS 11 introduced system-level support for these protocols.

The nuance is that, in the case of Apple, There isn't a simple toggle switch in Settings like on Android to type in a private DNS.Instead, you need to either install specific configuration profiles that define which secure DNS to use, or use third-party apps available on the App Store that create and manage those profiles for you. A simple search for “secure DNS” in the app store will show you several options.

In Windows 10, Support for DNS over HTTPS arrived in relatively recent versions. (Starting with build 19628 in 2020). Activation is performed through the system's network settings, following instructions detailed by Microsoft in its official documentation. Essentially, DNS servers that support DoH are defined and marked as such in the configuration interface.

If your operating system is not yet globally supported, all is not lost. Browsers like Google Chrome and Mozilla Firefox can handle DNS over HTTPS on their own.Regardless of what the system does, in practice, the browser ignores the globally configured DNS and communicates directly with a DoH server of your choice or from a predefined list; that's why it's advisable to choose among the best web browsers for Android that integrate good privacy options.

In some countries, Chrome and Firefox DoH is enabled by default with certain partner providers.However, the most sensible approach is to manually check your browser settings to see if it's enabled, which server it uses, and whether you want to change it. This allows you to have an encrypted resolution channel, at least for web browsing, even if the rest of your system applications continue to use conventional DNS.

Use of secure DNS in conjunction with security solutions

If you use security suites like those from Kaspersky or other brands, it's important that Review how they interact with secure DNS.Some web filtering or traffic analysis functions depend on being able to inspect, redirect, or analyze DNS requests, and if you activate an external DoH without notifying the security solution, you can disable some of its protections or cause conflicts.

In the specific case of Kaspersky, it is recommended First, enable Protected DNS in your router, operating system, or browser.Then go to the security product settings to ensure that the option to work with encrypted DNS is properly enabled. Within the network settings panel, you'll find sections like "Traffic Processing," where you can enable or adjust DoH support, and even specify which servers you want to use.

The objective is that Both the system and the security solution are rowing in the same directionThis avoids scenarios where the antivirus tries to intercept traffic that is already encapsulated in another way, or where the suite's secure DNS conflicts with the one you have configured yourself.

Private DNS and ad blockers like Brave

It is quite common for users who already employ browsers with built-in ad blockers, such as BraveYou might wonder if there's a way to extend this blocking to the entire system, so other apps can also benefit from the reduced ads. This is where a filtering DNS comes in; if you're unsure which option to choose, check out the analysis. Brave vs Firefox Focus to compare approaches.

While Brave It blocks ads and trackers only within the browser itself.A DNS service like AdGuard operates at a lower level, intercepting DNS requests from any app installed on the phone. This means that many standard ad-supported apps will also see their ads reduced, without each app needing to implement its own ad blocker.

At present, Brave does not offer an official filtering DNS service that works as a direct replacement for services like dns.adguard.com at the system level. Its focus is on the blocker and protections within the browser. Therefore, if you want the anti-tracking effect to extend to other applications, the usual approach is to continue using Brave for browsing and, in addition, configure a private DNS on Android pointing to a trusted filtering provider.

This mixed approach allows you to Take advantage of the best of both worlds: Brave's very fine-tuned blocking of the websites you visit. and the more general filtering that DNS performs on all apps. However, keep in mind that some free services are funded by advertising, and very aggressive blocking could affect their business model or some functionality.

Looking at the big picture, it's clear that playing with DNS settings, supplementing it with blockers, and, if necessary, with a VPN and a well-tuned security solution, is one of the most efficient ways to Gain privacy, reduce annoying ads, and minimize risks without overcomplicating your life.

Domain Name System
Related article:
Best free DNS for Android to improve your browsing

How to improve security in your Android photo gallery
It may interest you:
Various tricks to free up space on Android
Follow us on Google News