


There may be a typo, but anyone with minimal brains can figure out you tried to access Z website, and not Y. Then, this means that if you were to enter a website you didn't want others to know about, and this website actually offers HTTPS, if you make a typo, for instance, then OpenDNS will redirect you to this other page, in HTTP, which will let everyone know that you tried to access website Y.

In this case, they would see person A tried to access website X. This means that, when in a HTTP website, anyone can still see the contents of the said website. Has anyone noticed that, whenever you access a non-existent website, that you're redirected to an HTTP service: - ?įrom what I understand, DNSCrypt only encrypts DNS.
