It’s kind of common for me to change DNS servers frequently, so I created a light page which list all the DNS servers that I know of that does not log DNS requests.
**Link:**https://secu.pages.dev/
I wanted to post it here for people who are like me and needed a project like this.
How?
Malware distributors buy very cheap domains with uncommon TLDs and then use it.
I don’t understand how that would be a security risk to you. Even if I understood what the threat vector was, it would be very inefficient to use an OpenNIC tld to spread malware as you only target 0.0001% (random very low number) of internet users.
Here is a article talking about malware operators forcing OpenNIC to drop one of their TLDs back in 2019:
https://www.zdnet.com/article/opennic-drops-support-for-bit-domain-names-after-rampant-malware-abuse
Here is a article from sophos talking about malware using OpenNIC in 2021:
https://news.sophos.com/en-us/2021/04/15/bazarloader/
Here is a article that talk about recent(2023) attack that use OpenNIC:
https://thehackernews.com/2024/05/researchers-warn-of-catddos-botnet-and.html?m=1
As you can see, malware can target me and you based on OpenNIC.
From what I read these articles talk about post infection use of OpenNIC tlds. Anyway it was just a suggestion, it’s always a good idea to only use DNS servers you trust :)