🌌
Privacy Village Academy
Join The Community!AcademyAbout HGPE
  • Hitchhiker's Guide to Privacy Engineering
    • ❓What is HGPE?
      • ⚖️Who is this for?
      • 🧙‍♂️Privacy Engineering
      • 🎨Creative Privacy
      • 🔮Generative AI
      • 🧑‍💻About the Author
  • 🧙‍♂️The Ethical AI Governance Playbook 2025 Edition
    • 🤖Chapter 1 : AI Literacy
    • 🌍Chapter 2 : AI Governance in the 21st Century
    • ⌛Chapter 3 - Getting Started with AI Act Compliance
    • 🚀Chapter 4 : Rise of AI Governance: Building Ethical & Compliant AI
    • Chapter 5 : Introduction to the Lifecycle of AI
  • 🎓Privacy Engineering Field Guide Season 1
    • ❓Decoding the Digital World: Exploring Everyday Technology
    • 👁️Introduction: Why Privacy Matters?
      • Age of Mass Surveillance
      • Privacy & Democracy
      • Privacy & Government Surveillance
    • ⚡Chapter 1 : How Computers Work?
      • Electricity
      • Bits
      • Logic Gates
      • Central Processing Unit (CPU)
      • Graphic Processing Unit (GPU)
      • Motherboard
      • Data Storage
      • Databases
      • Operating System (OS)
      • Computer Code
      • Programming Languages
      • The File System
      • Bugs and Errors
      • Computer Virus
      • Internet of Things (IoT)
      • Cloud Computing
    • 🛰️Chapter 2 : How the internet works?
      • Physical Infrastructure
      • Network and Protocols
      • Switch
      • Routers
      • IP Address
      • Domain Name System (DNS)
      • Mac Address
      • TCP / IP
      • OSI Model
      • Packets
      • The Client - Server Architecture
      • Secure Socket Shell (SSH)
      • Transport Layer Security (TLS)
      • Firewall
      • Tunnels and VPNs
      • Proxy Server
    • 🖥️Chapter 3 : How Websites Work?
      • HTML
      • CSS
      • Javascript
      • Web Server
      • Browser
      • HTTP
      • Databases
      • Front End (Client Side)
      • Back End (Server Side)
      • Cookies
      • Local Storage
      • Session Storage
      • IndexedDB
      • XHR Requests
      • Web APIs
      • Webhooks
      • Email Server
      • HTTPS
      • Web Application Firewall
      • Single Sign-on (SS0)
      • OAuth 2.0
      • Pixels
      • Canvas Fingerprinting
      • Email Tracking
      • Containers
      • CI/CD
      • Kubernetes
      • Serverless Architecture
    • ⚛️Chapter 4 : How Quantum Computers Work?
      • Quantum Properties
      • Quantum Bits (Qubits)
      • Decoherence
      • Quantum Circuits
      • Quantum Algorithms
      • Quantum Sensing
      • Post-Quantum Cryptography
    • 📳Chapter 5 : Mobile Apps and Privacy
      • Battery
      • Processor
      • Mobile Operating Systems
      • Mobile Data Storage
      • Cellular Data
      • Mobile Device Sensors
      • Wireless Connectivity
      • Camera & Microphone
      • Mobile Apps
      • Software Development Kits (SDKs)
      • Mobile Device Identifiers
      • Bring Your Own Device (BYOD)
  • 🕵️‍♂️Privacy Engineering Field Guide Season 2
    • ❓Introduction to Privacy Engineering for Non-Techs
      • 🎭Chapter 1 : Digital Identities
        • What is identity?
        • Authentication Flows
        • Authentication vs. Authorization
        • OAuth 2.0
        • OpenID Connect (OIDC)
        • Self Sovereign Identities
        • Decentralized Identifiers
        • eIDAS
      • 👁️‍🗨️Chapter 2 : De-Identification
        • Introduction to De-Identification?
        • Input / Output Privacy
        • De-identification Strategies
        • K-Anonymity
        • Differential Privacy
        • Privacy Threat Modeling
  • 📖HGPE Story and Lore
    • 🪦Chapter 1 : The Prologue
    • ☄️Chapter 2 : Battle for Earth
    • 🦠Chapter 3 : A Nightmare To Remember
    • 🧙‍♂️Chapter 4 : The Academy
    • 🌃Chapter 5: The Approaching Darkness
    • ⚔️Chapter 6 : The Invasion
    • 🏰Chapter 7 : The Fall of the Academy
    • 🛩️Chapter 8 : The Escape
    • 🪐Chapter 9 : The Moon Cave
    • 🦇Chapter 10: Queen of Darkness
  • 📺Videos, Audio Book and Soundtracks
    • 🎧Reading Episodes
    • 🎹Soundtracks
  • 👾HGPE Privacy Games and Challenges
    • 🎮Data Privacy Day'23 / Privacy Treasure Hunt Game
    • 🧩Privacy Quest
  • 📬Subscribe Now!
Powered by GitBook
On this page
  • What is DNS?
  • What is a DNS Resolver?
  • DNS and Privacy

Was this helpful?

  1. Privacy Engineering Field Guide Season 1
  2. Chapter 2 : How the internet works?

Domain Name System (DNS)

DNS is a system that exists to make it easier for humans to remember a web address or IP address.

PreviousIP AddressNextMac Address

Last updated 2 years ago

Was this helpful?

What is DNS?

A DNS, or Domain Name System, is like a galactic phone book for the internet. It's responsible for translating human-readable website names, like google.com, into their corresponding IP addresses, like 216.58.194.174.

It is hard for many carbon-based lifeforms such as humans to remember long numbers such as . Therefore DNS is a system that exists to make it easier for humans to remember a web address or .

But thanks to the DNS, we can simply type in the name of the website we want to visit, and our computer will use the DNS to look up the corresponding IP address, allowing us to access the site.

Think of it like a translator for the internet, taking the names we know and love and converting them into the numbers the internet needs to function. And while it may not be the flashiest or most exciting part of the internet, it's definitely one of the most important, allowing us to navigate the vast digital landscape with ease.

A domain name server is a computer dedicated to remembering the look-up tables for IP addresses.

It makes it possible for people to find particular websites on the Internet, through the information provided during the domain name registration process.

What is a DNS Resolver?

A DNS resolver is a type of server that manages the “name to address” translation, in which an IP address is matched to the domain name and sent back to the computer that requested it.

They act as the querying counterpart to the responding DNS nameservers. From the user’s point of view, a DNS resolver serves as an interface between the user or application and the nameservers.

DNS and Privacy

Almost everything we do online is tracked and assembled to create accurate profiles of individuals. Everything we do online starts with a DNS request so it can be used to fuel surveillance capitalism.

Knowing the domain names of the websites you visit, or servers that apps access on your behalf is valuable metadata for your building profiles around individuals. .

Domain Name Server (DNS) spoofing is also an attack in which altered DNS records are used to redirect online traffic to a fraudulent website that resembles its intended destination.

It translates human-readable domains like to IP addresses like 23.456.258.1231.

, which stands for Internet Corporation for Assigned Names and Numbers, is a non-profit organization that was established in the United States in 1998 to help maintain the security of the Internet, and allow it to be usable by all.

A domain is comprised of two elements, including what comes before and after the dot. What comes to the right of the dot, such as a “com,” “org,” or “net,” is what is known as a .

Domains are sold by .

,Your ISP can see your browsing history, as most default DNS servers are not encrypted. Also members of the intelligence agencies are also keen on sucking up all that DNS traffic to gather metadata about individuals.

orderofepoch.com
ICANN
top-level domain, or TLD
registrars
Five Eyes
🎓
🛰️
IP addresses
IP address
Lilith infected the captured humans' brains with Shadow matter, growing inside the brain tissue and killing the brain's cells. Slowly eradicating any humanity that remained inside their brains and becoming a mind-controlled space zombie, aka cyborgs. - Anatomy of a Cyborg, Book of Doctor Talia, 2234 Anno Domini
The surviving Masters of the Order of Epoch formed an academy in the outer regions of the galaxy to train new candidates to join the fight for humanity’s survival. They are still demonstrating a valiant stand against the Dark Entity across space. Lilith is determined to eradicate every human city and stronghold in space and kill the remaining masters hidden in the Academy of the Order of Epoch. - Journals of Order of Epoch, 2243 Anno Domini
Page cover image