{"id":204,"date":"2021-03-23T14:26:00","date_gmt":"2021-03-23T19:26:00","guid":{"rendered":"http:\/\/sycured.127.0.0.1.sslip.io\/?p=204"},"modified":"2024-01-13T20:43:47","modified_gmt":"2024-01-14T01:43:47","slug":"bitel-drop-dns-bypass","status":"publish","type":"post","link":"http:\/\/10.42.0.68:8080\/blog\/bitel-drop-dns-bypass","title":{"rendered":"NET NEUTRALITY – Bitel: Drop DNS Bypassed"},"content":{"rendered":"\n

Bitel, an internet provider in Peru, drops DNS traffic to other servers.<\/p>\n\n\n\n

This is a direct attack on Net Neutrality, privacy, freedom, and security.<\/p>\n\n\n\n

In this example, I’ll use CloudFlare DNS<\/a> as the destination.<\/p>\n\n\n\n\n\n\n\n

The problem<\/h2>\n\n\n\n

I exclusively use CloudFlare DNS on my laptop (MacBook Pro) so I set up my settings to use it on Wi-Fi and Ethernet.<\/p>\n\n\n\n

I use security.cloudflare-dns.com or more exactly:<\/p>\n\n\n\n