Industry Resources

New DNS Encryption Tools Accelerate Privacy Online

Wednesday 25 April 2018 | 17:00 CET | Advertorial | provided by CUJO AI
Always wanted to know everything about the Dutch Telecoms market? Then the online Masterclass Introduction Dutch Telecom market is for you! Please enroll here!

Brand new Domain Naming Service (DNS) Cloudflare is gaining firm ground among internet users. Unlike many other DNS providers, Cloudflare positions itself as strictly privacy-oriented service. 

According to CUJO AI data, it has acquired nearly 4% of the total DNS market since its launch on April 1st and now stands as the fifth most popular DNS provider. Moreover, Google and Apple announced that they will start encrypting DNS traffic. What does that mean for the internet privacy?

DNS (Domain Naming Service) turns the websitet address you enter into a computer-recognizable IP address. This way a user can access the content they were looking for online. 

Even though that content might be encrypted, the user’s IP is not, and neither is the DNS traffic. Cloudflare and it’s alternatives (OpenDNS, Google Public DNS, and Quad9 amongst others) allow for the encrypted traffic what would ensure that it’s impossible to spy on the websites visited by the home user. 

Even though CUJO AI data suggests that only a minority of DNS traffic, is currently encrypted, we see a steady trend that more endpoints are willing to engage in, so-called DNS-over-TLS. Apple is planning a DNS over TLS feature for devices running iOS 11 and above, while Google is extending its DNS over TLS support to the mobile OS, meaning Android devices are getting an extra layer of security.

Considering that such big players are entering the game and that Cloudflare managed to get a lot of attention along with a significant market share so quickly, we can fully expect that the trend will just grow stronger.

Security vs. Privacy: a Modern Dilemma

DNS encryption, however, creates additional security risks. One of the most common cybersecurity methods is DNS blacklisting. It relies on analyzing unencrypted traffic, finding known-bad websites and blocking them. 

DNS blacklisting databases are updated every 12 to 36 hours. It is not the best security method even now when the traffic is not encrypted. It will become obsolete once a universal DNS encryption takes place. 

Machine-learning based threat detection is the solution that is referred to as the more effective alternative. It works in real time employing algorithms that become more accurate by the minute. 

Its strength lies in the fact that it is proactive. Instead of using databases that can have incorrect or expired information, such security measures learn the network behavior and identify malicious patterns.

That way even completely new threats that have not been registered on any databases yet can be identified, and the end user can be alerted. Early intervention is crucial since some malware can cause irreparable damage, such as permanent file corruption or sensitive information theft.  

While traditional security vendors rely on DNS blacklisting services to provide security solutions, CUJO AI uses artificial intelligence algorithms and behavioral analysis to ensure network security. CUJO AI machine learning algorithms learn from huge datasets and create behavioral patterns out of them. 

They list what kind of behavior is known-good and how a malicious behavioral pattern looks like. The algorithms compare the usual network and device behavior with the known-bad and known-good behavior. If it notices unusual or potentially malicious behavior, it blocks it and notifies the user. 

It should also be noted that highly focused spear-phishing or whaling attacks do not leave a significant footprint on the internet and are rarely included in the Cyber Threat Intelligence databases. Nevertheless, machine-learning methodology can detect such malicious activity by design.

Privacy Is a Growing Concern for Americans

Two-thirds of Americans think current laws are not enough to protect their privacy, and 61% would like to do more themselves in order to ensure it.  However, many are not confident on how to go about it.

Privacy by design is no longer just a concept, either, as only the data absolutely necessary for the completion of duties can now be held and processed.

General Data Protection Regulation (GDPR) is currently setting the precedent for user privacy treatment, and it is very likely that it will become the future gold standard. The best way to comply with it is to automate the vast majority of data processing, which is a task that can also be achieved by machine learning.

In fact, GDPR encourages that to some extent by stating that access to personal data should be limited to those "needing to act out the processing." Ensuring that only machines handle that data is a viable solution, albeit one that needs to be worked on. 


CUJO AI is a pioneer of consumer IoT and network security since 2015, combining AI with real-time threat intelligence. The company is providing network operators AI-driven solutions, including AI security, advanced device identification, advanced parental controls, network analytics, and more.

CUJO AI Platform creates intuitive end-user facing applications for LAN and wireless (mobile and public WiFi) security. Network operators that deploy CUJO AI solutions on their infrastructure provide personalized customer experience, offer advanced protection, and ensure seamless device management. 


Sponsor Details

Name    CUJO AI
Contact    https://www.getcujo.com/

Free Headlines in your E-mail

Every day we send out a free e-mail with the most important headlines of the last 24 hours.

Subscribe now

Categories: General
Companies: CUJO
Countries: World
::: add a comment
This article is part of dossier


Add comment

We welcome comments that add value to the discussion. We attempt to block comments that use offensive language or appear to be spam, and our editors frequently review the comments to ensure they are appropriate. If you see a comment that you believe is inappropriate to the discussion, you can bring it to our attention by using the report abuse links. As the comments are written and submitted by visitors of the Telecompaper website, they in no way represent the opinion of Telecompaper.


Google lets Android smartphones act as 2SV security keys

Published 11 Apr 2019 09:54 CET | World
Google has announced that all phones running Android 7.0 Nougat and above can now be used as two-step-verification (2SV) physical ...

The next generation of connected experience - Precision, protection and personalization

Published 21 Sep 2018 15:00 CET | World
The smart home concept started out as a dream, but it turned into a mess. IoT enthusiasts were so excited that they can connect ...

5 Key Security Tips to Avoid an IoT Hack

Published 10 Aug 2018 14:24 CET | World
Recently, Russian PIR Bank lost USD 1.000.000 because of a compromised router that allowed hackers to gain entry into their local ...

Machine Learning vs Chronic Security & Privacy Issues

Published 27 Jul 2018 14:58 CET | World
The Internet has many issues. Privacy. Lack of encryption and its governance. Questionable marketing techniques. A misinformed ...

CUJO AI named to WEF annual list of Technology Pioneers

Published 28 Jun 2018 14:04 CET | World
The World Economic Forum has unveiled its annual list of Technology Pioneers. The 61 early-stage companies are recognized for ...

M-Tiba, Juvo among WEF annual list of Technology Pioneers

Published 28 Jun 2018 10:15 CET | World
The World Economic Forum has unveiled its annual list of Technology Pioneers. The 61 early-stage companies are recognized for ...

Q&A Session: New Trends Advance User Privacy

Published 11 Jun 2018 13:00 CET | World
Privacy and security online are one of the top concerns of Americans, especially after numerous massive data breaches (Equifax, ...

New Approach to GDPR: Using Machine Learning to Enhance Privacy

Published 15 May 2018 13:00 CET | World
GDPR has no precedent. However, it could become the worldwide gold standard of privacy laws. In such a case, these ...

Mobile First: Security Concerns and Solutions

Published 08 May 2018 13:00 CET | World
The majority of people - 83%, in fact - use their mobile devices to go online. 89% of these users connect to the internet via a ...

DNS blacklisting is dead. What's next?

Published 23 Mar 2018 12:20 CET | World
Broadband customers are bringing millions of new smart devices into their homes. The number of connected devices might reach 30 ...

Why Do We Need Advanced Parental Controls?

Published 22 Feb 2018 07:30 CET | World
In 2016, Pew Research Center revealed that 60% of parents had checked their teen's social media. 61% of parents agree that ...

CUJO AI Platform for Network Operators

Published 01 Feb 2018 15:20 CET | World
Company helps Network Operators support their customer's privacy by placing IoT devices beyond the reach of hackers. After ...

Smart home market still small in Europe, but with many players pushing it forward adoption will rise

Published 09 Nov 2017 13:51 CET | Europe
The smart home market in Europe is still in its early days, with few households owning connected products. However, a wide range ...

Cujo founds subsidiary in Lithuania

Published 13 Oct 2017 00:37 CET | Lithuania
US-based company Cujo has founded the subsidiary Cujo Baltic in Lithuania, reports Vz.lt. The company plans to create up to 100 ...

Go Ignite alliance reveals winners of second global startup call

Published 11 Sep 2017 11:05 CET | World
The Go Ignite alliance of telecommunications companies including Deutsche Telekom, Orange, Singtel and Telefonica has announced ...

Nokia names winners of Open Innovation Challenge 2016

Published 26 Oct 2016 09:46 CET | World
Start-ups with innovative products focusing on the connected home, digital health and big data have taken the top three spots in ...

Calendar   /   Industry Events

26 Oct Harmonic Q3 2020
26 Oct Alphabet Q3 2020
26 Oct Twilio Q3 2020
26 Oct CCW Europe 2020
27 Oct Akamai Technologies Q3 2020
27 Oct Megacable Q3 2020
27 Oct Microsoft fiscal Q1
27 Oct A10 Networks Q3 2020
27 Oct Juniper Networks Q3 2020
27 Oct Siminn Q3 2020
27 Oct Telefonica Brasil Q3 2020
27 Oct Sequans Communications Q3 2020
28 Oct Telefonica Deutschland Q3 2020
28 Oct Equinix Q3 2020
28 Oct 8x8 fiscal Q2
28 Oct Ooredoo Q3 2020
28 Oct ZTE Q3 2020
28 Oct Belden Q3 2020
28 Oct Extreme Networks fiscal Q1
28 Oct KPN Q3 2020
28 Oct Cognizant Q3 2020
28 Oct Telecoms World Asia 2020
29 Oct Digital Realty Q3 2020
29 Oct Facebook Q3 2020
29 Oct Telefonica Q3 2020
29 Oct Dasan Zhone Q3
29 Oct Ribbon Communications Q3
29 Oct Comcast Q3 2020
29 Oct Veon Q3 2020
29 Oct NTT Docomo fiscal Q2
::: More Calendar Items