Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


03:25 PM
Dark Reading
Dark Reading
Products and Releases

Quad9 Offers Owners of Android-Based Devices DNS Security Protections for Free

Privacy-centric DNS service blocks access to more than 15 million malicious events per day, limiting access to malware and phishing as well as encrypting private DNS data.

Berkeley, CA, May 7, 2019 – Today Quad9 released Quad9 Connect - a mobile app allowing the more than 2.5 billion global users of smartphones built on Android to use the free security and privacy driven recursive domain name service (DNS) to block access to malicious websites and maximize web browsing privacy while using an Android mobile device. Launched in late 2017, Quad9 is used billions of times a day across6 continents, typically blocking access to tens of millions of malicious events per day. The Quad9 Connect mobile app can be downloaded from the Google Play Store at https://bit.ly/quad9-android.

Whenever a Quad9 user clicks on a website link or types an address into a web browser, Quad9 checks the site against a list of domains combined from more than 19 different threat intelligence partners. Each threat intelligence partner supplies a list of malicious domains which examine such factors as scanned malware discovery, network IDS past behaviors, visual object recognition, optical character recognition (OCR), structure and linkages to other sites, and individual reports of suspicious or malicious behavior. Based on the results, Quad9 completes or denies the lookup attempt, preventing connections to malicious sites when there is a match.

"Over the past 18 months, global users of Quad9 have bolstered their cyber protections and maximized their privacy," said John Todd, executive director of Quad9. "Our Android solution has been in development for several months, and we're excited to add an easy-to-use solution to solve the otherwise difficult configuration problems that Android presents for DNS modification. The Quad9 network is fully prepared for the expected exponential growth of traffic as global Android users come on board."

"IBM is proud to be a key member of Quad9 since its launch in 2017. Since then, the service has experienced tremendous adoption," said Paul Griswold, Director of Strategy and Product Management, IBM X-Force Threat Intelligence. "The launch of the Quad9 Android app will help to further extend Quad9's user base and make its security, privacy, and performance benefits available to Android mobile users worldwide."

Privacy is built into the DNA of Quad9. No personally identifiable information is collected or logged by the system. IP addresses of end users are not stored to disk or distributed outside of the equipment answering the query in the local data center. The application uses DNS-over-TLS protocols to encrypt DNS data over the Internet, ensuring that mobile carriers, wireless hotspots, or any other network operator in the path cannot see the DNS requests from the client. Quad9 is the only not-for-profit organization dedicated only to the operation of DNS services. There are no commercial motivations for revenue streams involving collecting or selling your private data, and the core charter of the organization is to provide secure, fast, and private DNS security.

The application supports encryption using the standards-based protocol DNS-over-TLS. Quad9 Connect gives feedback to the user in the event that a referenced site is on the threat list via a notification. It supports "walled garden" hotspot signups and works across both Wi-Fi and mobile carrier data networks.

Quad9 systems are currently distributed worldwide in more than 140 locations in 82 countries, with an expansion target of 200 locations in total for 2019. These servers are located primarily at Internet Exchange points, meaning the distance and time required to get answers is lower than almost any other solution. These systems are distributed worldwide, not just in high-population areas, meaning users in less well-served areas can see significant improvements in speed on DNS lookups. The systems are "anycast" meaning queries will automatically be routed to the closest operational system.

About Quad9

Quad9 is a free, recursive, anycast DNS platform that provides end users robust security protections, high-performance, and privacy. Quad9 is an independent nonprofit formed from a collaboration of IBM, Packet Clearing House and the Global Cyber Alliance. Learn more at www.quad9.net.


Media Contact:

Adam Benson
Vrge Strategies
[email protected]

Phone: (202) 999-9104

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
How Attackers Infiltrate the Supply Chain & What to Do About It
Shay Nahari, Head of Red-Team Services at CyberArk,  7/16/2019
US Mayors Commit to Just Saying No to Ransomware
Robert Lemos, Contributing Writer,  7/16/2019
The Problem with Proprietary Testing: NSS Labs vs. CrowdStrike
Brian Monkman, Executive Director at NetSecOPEN,  7/19/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-07-22
In SweetScape 010 Editor 9.0.1, improper validation of arguments in the internal implementation of the Memcpy function (provided by the scripting engine) allows an attacker to overwrite arbitrary memory, which could lead to code execution.
PUBLISHED: 2019-07-22
In SweetScape 010 Editor 9.0.1, an integer overflow during the initialization of variables could allow an attacker to cause a denial of service.
PUBLISHED: 2019-07-22
All versions up to V1.19.20.02 of ZTE OTCP product are impacted by XSS vulnerability. Due to XSS, when an attacker invokes the security management to obtain the resources of the specified operation code owned by a user, the malicious script code could be transmitted in the parameter. If the front en...
PUBLISHED: 2019-07-22
tcpdump.org tcpdump 4.9.2 is affected by: CWE-126: Buffer Over-read. The impact is: May expose Saved Frame Pointer, Return Address etc. on stack. The component is: line 234: "ND_PRINT((ndo, "%s", buf));", in function named "print_prefix", in "print-hncp.c". Th...
PUBLISHED: 2019-07-22
aubio 0.4.8 and earlier is affected by: null pointer. The impact is: crash. The component is: filterbank. The attack vector is: pass invalid arguments to new_aubio_filterbank. The fixed version is: after commit eda95c9c22b4f0b466ae94c4708765eaae6e709e.