You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/public-dns/choosing-a-protocol.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ When it comes to privacy, DoT isn’t the strongest option. Because it uses a de
15
15
16
16
### DNS-over-HTTPS (DoH)
17
17
18
-
DNS-over-HTTPS sends your DNS queries through the same secure connection used to load websites — over port 443. This makes it harder for networks or censors to detect or block, which is great for privacy and especially useful when bypassing censorship.
18
+
DNS-over-HTTPS sends your DNS queries over port 443, the same secure connection used to load websites. This makes it harder for networks or censors to detect or block.
19
19
20
20
However, it can be unstable and result in performance issues. When all data packets share the same connection, they rely on the same transport layer. This can cause a problem called head-of-line blocking. If one packet is lost or delayed, it holds up everything else, including unrelated packets. As a result, all responses are delayed, even if most of the data is ready to be delivered.
0 commit comments