I would not do that. The whole idea behind Tor Browser is to make users look similar. By using a custom DNS provider you stand out from the crowd, thus making yourself more unique/identifiable. A website may not be able to see who you are, but it’s gonna have a way easier time seeing that you’re the same person visiting as the person who was there yesterday.
And that’s why you should stick with tor browsers defaults (with the exception of adjusting security slider to meet needs). They have a whole team who are paid to think about it.
I would not do that. The whole idea behind Tor Browser is to make users look similar. By using a custom DNS provider you stand out from the crowd, thus making yourself more unique/identifiable. A website may not be able to see who you are, but it’s gonna have a way easier time seeing that you’re the same person visiting as the person who was there yesterday.
Well, would they stand out to the next node but not to all Intermediaries, right, including the website they are visiting?
How would the website know that you are using a custom DNS provider?
redirecting you to a unique subdomain and watch which resolver comes calling. that’s how ipleak and co. check for DNS leaks.
Interesting… Never thought about that.
And that’s why you should stick with tor browsers defaults (with the exception of adjusting security slider to meet needs). They have a whole team who are paid to think about it.