Check if your browser uses Secure DNS, DNSSEC, TLS 1.3, and Encrypted SNI

Cloudflare's Browsing Experience Security Check online tool tests the capabilities of the web browser in regards to certain privacy and security related features.

For a subset of Internet users, privacy is of uttermost importance. While the majority seems indifferent, some try their best to implement protective mechanisms to eliminate or at least reduce what companies and maybe even State actors may find out about them when they use the Internet.

Whether that is successful or not depends on the program used to connect to Internet sites, e.g. a browser or media client, and also the system configuration.

The push to using HTTPS on the Internet ensured that much of the data that is transferred between a user's browser or program and Internet sites is encrypted. New technologies, such as Secure DNS or Cloudflare's own encrypted Server Name Indication (SNI) are designed to address leaks caused by DNS queries.

Browsing Experience Security Check

browsing experience security check

Browsing Experience Security Check tests a web browser's capabilities in regards to security and privacy features.

Note: The test is maintained by Cloudflare; the company designed Encrypted SNI which the test checks for among other things.

The test is straightforward: connect to the test page using your browser and hit the run button on the page to run the test.

It tests whether Secure DNS, DNSSEC, TLS 1.3, and Encrypted SNI are enabled. Here is a short description of each of the features:

  • Secure DNS -- A technology that encrypts DNS queries, e.g. looking up ghacks.net to retrieve the IP address. Two standards, DNS-over-TLS or DNS-over-HTTPS fall under the category.
  • DNSSEC -- Designed to verify the authenticity of DNS queries.
  • TLS 1.3 -- The latest version of the TLS protocol that features plenty of improvements when compared to previous versions.
  • Encrypted SNI -- Server Name Indication, short SNI, reveals the hostname during TLS connections. Anyone listening to network traffic, e.g. ISPs or organizations, may record sites visited even if TLS and Secure DNS is used. Encrypted SNI encrypts the bits so that only the IP address may still be leaked.

The only browser that supports all four of the features at the time is Firefox. Two of the features are still in development and testing though:

Here is a short list of instructions on setting up Secure DNS and Encrypted SNI in Firefox:

  1. Load about:config in the Firefox address bar.
  2. Confirm that you will be careful.
  3. Encrypted SNI: Search for network.security.esni.enabled and toggle the value to True
  4. Secure DNS: Search for network.trr.mode and set it to 2.  Search for network.trr.uri and set it to https://mozilla.cloudflare-dns.com/dns-query

Note that Secure DNS supports other servers if you don't want to use Cloudflare for that.

SOURCE: https://bit.ly/2lRtMLY (ghacks.net)


Ransomware Attack Costs $1.5 Million to Riviera Beach (Florida)

Ransomware continues to be a nightmare for individuals and businesses worldwide – but in the U.S., municipal government offices increasingly seem to be the target of choice for cybercriminals.

The city of Riviera Beach, Florida made news recently when it announced it was paying approximately $600,000 in ransom to undo a ransomware attack it suffered in late May. While not usually advised by law enforcement and security companies, city officials concluded that there was no other way to recover the files so the decision was made to pay the ransom.

Handing over 65 bitcoins doesn’t guarantee that their data will be restored, though. When Palm Springs in Palm Beach County was hit in 2018, officials paid an undisclosed ransom but still lost two years of data. In fact, less than half of those who pay a ransom ever regain access to their data.

In addition to the ransom paid, Riviera Beach also invested more than $900,000 into new hardware in the hopes that they do not have the same vulnerabilities as the old ones. That’s $1.5 million in damages from one attack.

Unfortunately, it sounds like city officials could have avoided making this payment and additional investment if they had followed some basic data protection strategies.

Continue to read on : https://www.acronis.com/en-us/blog/posts/ransomware-attack-costs-15-million-riviera-beach-fl