How and Why To Re-Rout DNS Through Your Computer or Phone

In a few of my previous tutorials I briefly touch on DNS re-routing, but never really get into it in full details, so I figured why not here today? Before moving forward, learning to re-route your DNS is important because it is a means of protecting your personal data, devices, network connectivity and internet traffic away from the spying or prying eyes of your Internet Service Provider (ISP), Government and any other interested 3rd parties, such as advertisers or even hackers. As for how DNS works or how switching it effects your internet connectivity, I think the short video below is the best demonstration. It explains how DNS re-routing configures your computer or phone to connect through a DNS server first, in order to connect to a website second – instead of connecting to a server owned by your ISP to connect to that same website, get it?

While there are number of ways to re-route your DNS and different services providers to choose from, for the purposes of this article, I consider the following to be the worlds best “Top 3” – Cloudflare DNS, IBM Quad 9 and Google’s Public DNS. As you can read below, each of which have their own unique benefits.

Cloudflare DNS:

Ipv6: 2606:4700:4700::1111
Ipv6: 2606:4700:4700::1001

Cloudflare DNS is my personal DNS provider of choice, installed on both my computer and phone. As for why I choose them, this is because Cloudflare DNS anonymizes IP Addresses, deletes logs daily and doesn’t mine any user data. Additionally, Cloudlfare DNS also offers security features not available in many other public DNS service providers, such as “Query Name Minimization” – which diminishes privacy leakage by sending minimal query names to authoritative DNS servers when connecting to websites.

Learn More – Cloudflare DNS:

IBM Quad 9:

Ipv6: 2620:fe::fe
Ipv6: 2620:fe::9

IBM Quad 9. Whereas Cloudflare may be more beneficial for activists and researchers, IBM Quad 9 on the other hand is probably of more benefit to your average home owner, parent or business owner. This is because Quad 9 routes your internet connections through DNS servers that actively blacklist known malicious websites, as well as websites which have previously been compromised by data breaches. In addition to this, Quad 9 servers also protect your internet’s incoming/outgoing connections as a means of preventing any of your devices from being caught up in a botnet. Quite simply, this means that while on Quad 9 servers, you never have to worry about any of your devices being hijacked or caught up in any sort of DDoS or crypto-mining campaigns, even smart devices connected to the “Internet of Things” (IoT).

Learn More – IBM Quad9:

Google Public DNS:

Ipv6: 2001:4860:4860::8888
Ipv6: 2001:4860:4860::8844

Google Public DNS servers on the other hand are ideal for people in countries such as Ethiopia, Sudan, Turkey, Syria, North Korea and the like which are all known to have restricted, censored, shut down and/or sealed off access to certain portions of their national internet in the past. In fact, as you can see via the picture provided below, activists affiliated with Anonymous Cyber Guerrilla have literally spray painted Google’s DNS in public places in times of National crises as a means of raising awareness and alerting citizens how to bypass local internet restrictions imposed by their Government – opening people back up to the global world-wide-web. In addition to bypassing regional internet restrictions, compared to ISP’s in some 3rd world regions, switching to Google DNS servers might actually help improve or speed up your load time/internet connection.

Learn More – Google Public DNS:

No photo description available.


How To Switch DNS On Windows?

1.) Go to the start menu and type in “Settings,” press enter and then select “Network & Internet” options

No photo description available.


2.) Click on “Change Adapter Options

Image may contain: text


3.) Select the “Internet Connection” your are using then click on the “Properties” button when it pops up

No photo description available.


4.) Scroll through and individually select/click on “Internet Protocol Version IPv4” and “Internet Protocol Version IPv6” then press the “Properties” button again

No photo description available.


5.) Select “Use The Following DNS Server Address” and manually enter in your DNS service provider of choice – see IPv4 and IPv6 Addresses above – then press “OK

No photo description available.


That’s it, really. Generally speaking, the setup should be the same on your Apple PC just as well. It’s also important to note that you can actually do a mix-match of the addresses listed above. For example, you can use Cloudflare for IPv4, but then choose IBM for IPv6 – vice versa – and your internet connection will not be broken. Just so you are aware, while IPv2 usually signifies the country of origin or device where you are coming from, but most all devices on the world-wide-web these days connect to websites via IPv4 connections, making IPv4 the most important settings to modify.

How To Switch DNS On Phone?

Changing or re-routing the DNS settings on your phone can either be incredibly complicated or incredibly simple, depending on your level of skill/expertise. However, far and away the easiest means to go about accomplishing this is by installing a 3rd party App – either by going to your App, Apple or Google Play store(s). Simply just type in “Change DNS” to your search settings, press enter, and this should open up a whole host of options to choose from. Simply choose the one that you feel is best for you and enter in the Addresses listed above.

If You are A Little More Advanced…

OpenNIC Project. For those of you whom may be unfamiliar, “OpenNIC (also referred to as the OpenNIC Project) is a user owned and controlled top-level Network Information Center offering a non-national alternative to traditional Top-Level Domain (TLD) registries; such as ICANN. Instead, OpenNIC only operates namespaces and namespaces the OpenNIC has peering agreements with.

In other words, they are open DNS addresses, servers and proxies not indexed by global internet agencies or their Governments. Stay classy mi amigos 😉

Learn More -OpenNIC Project:

See Also – CyberGuerrilla Internet Censorship Care Package:

Responding To IBM X-Force Threat Intelligence’s Report Claiming Anonymous & Hacktivism are Dead

A couple days ago I said I was going to write a “retort” to IBM‘s new ‘investigative report’ surrounding the state of hacktivism over the course of the last half decade, so I suppose I have to do it – right? Truth be told, I only learned of their report following two other publications by Catalin Cimpanu of ZDNet and Perluigi Paganini of Security Affairs. As they and IBM are quick to point out, hacktivist events are said to have dropped as much as 95% since this time in 2015 – at least according to IBM’s so-called data, that is.

However, diving into their X-Force Threat Intelligence report myself, I quickly discovered that, according to IBM‘s data, the multi-billion dollar agency claims that only 2 Cyber Attacks were carried out at the hand of Anonymous and international hacktivists during the calendar year of 2018. This figure is in comparison to 35 Cyber Attacks carried out by the same groups in 2015, providing them with their figure of a 95% decline in cyber activity.

Now, I am not exactly sure who(m) IBM is trying to fool here, but that figure is just downright pathetic – laughable at best. For example, Anonymous hackers were responsible for the breach of 1 million users of Lenovo, a breach of and websites, a leak of Sudan’s Ministry of Defense, leaks of the Italian National Agency of Regional Services and Department of Pharmacies, leaks of the Spanish Chamber of Commerce and Vox Political Party, a leak of Atlanta’s International Airport, leaks from the French National Association of Police Officers, FBI and MI6, along with multiple Integrity Initiative Leaks from the UK’s Institute for Statecraft, a two day crash of the Central Bank of The Bahamas, hacks/leaks of EuroPalestine, TIVIT Television service of Brasil, New York Taxi systems and separate leaks of the French Ministry of Justice and Ministry of Defense. And that’s literally just from December 2018 alone!!

Don’t believe me? Check the tape, I’ve been running this website since October 2018 and all of those incidents above were not only covered by yours truly, but they are also certified by Google News and received international press worldwide! I really wish I were exaggerating, but that’s also maybe only half of the cyber attacks I covered in December 2018 alone.

Check The Tape:

To be fair, I guess, IBM predicates their data set by claiming they only included attacks which were deemed to have caused “significant damage” – without explaining exactly what that criteria entails. However, that hasn’t stopped some of the tech’s worlds biggest names from declaring that “hacktivism is dead“and “Anonymous has died a slow death” – specifically citing IBM‘s data in their conclusions.

However, some might call the doxxing of thousands of members of the FBI, MI6, or the crashing of a Central Bank during a weekday, or the leak of 30,000 members of a Spanish political party, or the Bank Accounts of UK military contractors pretty significant – namely me. Therefore, despite those sorry excuses for researchers working for IBM‘s X-Force Threat Intelligence labs and all of the ill educated reports who covered IBM‘s report without actually reading the full copy, Rogue Media Labs declares that Anonymous and international hacktivist are alive and well! You just have to know where to look to find out where. It should also be noted that IBM‘s full report isn’t technically available for public browsing – so Anonymous has taken care of that as well😉.

Download IBM:

Copy of IBM’s Full Report:

[pdf-embedder url=””%5D