Open DNS and DNS Poisoning/A Solution

August 14, 2008 at 6:41 am Leave a comment

Surprisingly enough, PC World has come up with a solution to DNS poisoning:  USE OPEN DNS.  Heck, I even said so; there was even a post where I intimated the relative intelligence, unfortunately, of not using Open DNS.  If you use a router (my older Belkin, with three computers, two different operating systems–two out-of-the-box and one made-to-spec locally (a mistake)–etc. wasn’t going to accept it without a whole system tweak), try to set up your router with it, although it isn’t all-important.  The more randomization of your address and path you use, the better.  I’ve even gone back to an actual hidden mode, which I haven’t done since the first days of the public internet.  If you have essential information, back it up offline.  Briefly what I mean by that is one of two things, with the latter possibly the more reasonable; either write it on a disk (CD/DVD) or else write it to something like a USB hard drive and only use said external drive for backups.


And there is absolutely no certain cure except hard copy or ROM discs.  That is the “white line” mechanism that I’ve discussed, and actually doesn’t apply to any kind of electromagnetic reading except to something like Notepad ++ where it’s a character-only transition, with no exec’s (*.exe files) able to cross the line.  The discussion of solutions is becoming very high level.  The military solution in the 70s in a barely similar situation was to use a mutual one-time code at both ends, essentially a “book code”.  The problem here is, someone else may have the dam’ book.  Okay.  I couldn’t find it on two pages of Google.  I have a book, you do–seems like this may have been touched on in Da Vinci Code.  I reference page, line, and word (by whatever system; remember you can also count characters); you take my references (ideally alphanumeric, with obscuring characters, designed to obfuscate the nature of the code) to an identical copy of the book it is…and reconstruct what I’m saying.  I’m nearly certain EAP (no, my friends of online shorthand, I won’t decode that) referenced it in a cryptographic study in one of his shorts (quoth the raven).


A one-time is a shared book used to encode/decode one message and then destroyed, and is close to fool-proof depending on distribution of the book and the method.  What I mean is that your data can be read and decrypted in real time almost without doubt.  Bear in mind that a book code must use words not letters, although phonetic transliteration might barely be possible.  True randomization is not possible with state of the art, although I believe the model could be constructed on primes; I am not going that way.  I’m 55 in a couple of months, and I don’t have time to study that too.


Hopefully I’ve scared and confused the stubborn ones.  The easiest solution (not foolproof, but it takes you from bright orange to camouflage) is Open DNS.  It’s easy to use for one IP address (you don’t have to use it on your home router).  It will help protect you from phishing–going to your bank, for instance, and entering in information…only it wasn’t actually your bank.


P.S.  I deployed Open DNS a couple of years ago, as I recall…

Entry filed under: computers/tech, current news. Tags: , , .

eHarmony and Firestarter A Bit Further Explanation of the Previous Post…

Leave a Reply

Please log in using one of these methods to post your comment: Logo

You are commenting using your account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Trackback this post  |  Subscribe to the comments via RSS Feed

%d bloggers like this: