The vulnerability allows an ISP, as well as any on-path eavesdroppers, to see what websites a user may be visiting. This is possible because the browser's DNS requests are sent to the ISP DNS server directly, and not sent through the VPN.
This only occurs with certain types of VPNs, e.g. "split-tunnel" VPNs, where traffic can still be sent over the local network interface even when the VPN is active.
- Encrypting DNS requests, such as through the DNSCrypt protocol, which prevents the requests from being seen by on-path eavesdroppers
- Using a VPN client which sends DNS requests over the VPN
- "What is a DNS leak and why should I care?". dnsleaktest.com. 2017-05-29. Retrieved 2016-09-03.
- "DNS Leak Test". www.dnsleaktest.com. Retrieved 2016-09-03.
- "How to Encrypt Your DNS for More Secure Browsing". Retrieved 2016-09-03.
|This computing article is a stub. You can help Wikipedia by expanding it.|