Surfshark, has announced that it is launching a public DNS (Domain Name System). Unlike the default DNS servers provided by ISPs (Internet Service Providers), which often track and record user activity, Surfshark’s new public DNS server ensures privacy by not logging browsing history, data transfers, or any other internet behavior. Surfshark DNS was created for privacy-conscious individuals and organizations, helping them to take the first step towards privacy and security by using this tool.
Many people rely on the default DNS provided by their ISP or other big companies, often overlooking the potential to enhance their browsing experience. A public DNS service hosted by a trustworthy entity would have a positive impact on privacy online and may even improve overall network performance. However, it’s important to note that UDP and TCP DNS queries are still sent over the internet in plaintext, making them susceptible to interception. To counter this, Surfshark’s DNS server supports secure DNS protocols such as DoT, DoH, and DoQ to keep browsing activity private.
What is a DNS server
DNS server works as a translator of domain names like bbc.com or thenewyorktimes.com, into IP (Internet Protocol) addresses that computers can understand. K. Kaciulis explained that it acts as the phonebook of the internet, ensuring users can access websites using easy-to-remember names instead of numerical IP addresses.
How does a DNS work
When a request is made to access any website on the browser, the DNS resolution process is initiated. During this step, the domain name entered into a browser is converted to the corresponding IP address required to locate the desired web resource. The initial DNS query is sent to a resolver, which first contacts a root server to get information about the correct top-level domain (TLD), such as .com or .org. This TLD data then helps direct the request to the server responsible for the specific domain.
Finally, it reaches the authoritative name server, which holds the exact IP address for the website. This address is then sent back so the site can be loaded.
Benefits of using Surfshark public DNS
ISPs may collect and log users’ DNS queries for user identification. They can also monitor DNS traffic, both passively and actively, and are capable of blocking specific hostnames when necessary. Additionally, user data can be used for targeted advertising or sold to third parties. Surfshark DNS server is different, it operates under a strict no-logs policy, which means no collection, storage, or sharing of browsing activity.
Using a Surfshark DNS may lead to a positive improvement in overall network performance. Unlike default ISP DNS servers, which can become overloaded. Since the Surfshark public DNS infrastructure is spread out, it has a better understanding of geolocation, which can provide users with closer servers. As a result, it may reduce delays, connection drops, and improve overall browsing reliability.
I will be testing this and providing my feedback on how this works as I never use ISP provided DNS servers for speed, security and privacy reasons. Stay tuned for that.
Texas school district notifies 47K students and staff of data breach that leaked SSNs, credit cards, and more
Posted in Commentary with tags Hacked on May 5, 2025 by itnerdAlvin Independent School District over the weekend confirmed it notified 47,606 people about a June 2024 data breach that compromised the personal info including names, SSNs, credit and debit card numbers, financial account numbers, medical and health insurance info, and more. Ransomware gang Fog claimed responsibility for this attack in July 2024, but AISD has not yet verified this claim.
In a blog post reporting this news, Paul Bischoff, Consumer Privacy Advocate at Comparitech, wrote:
“Fog is a ransomware gang that first started claiming attacks on its website in July 2024. It has a history of targeting US schools but is not limited to them. In addition to encrypting files, Fog also steals data and targets development environments. Fog has claimed a total of 20 confirmed ransomware attacks, 12 of which were on educational institutions. Most recently, the gang attacked the University of Applied Sciences and Arts Northwestern in Switzerland. Fog claimed another 157 unconfirmed attacks that haven’t been acknowledged by the targeted organizations, 80 of which it claimed in 2025. However, the group stopped posting new victims in April.”
“In 2024, Comparitech researchers logged 79 confirmed ransomware attacks on US schools and colleges. Those attacks compromised 2,857,156 records and came with an average ransom demand of $827,000. In 2025 to date, we’ve tracked 15 confirmed ransomware attacks on US education, plus 36 unconfirmed claims.”
This incident highlights how vulnerable schools are. Which is why more time and effort needs to be put into defending them so that they stop being the easiest targets for threat actors. And the sooner that happens the better.
Leave a comment »