Keep Factually independent

Whether you agree or disagree with our analysis, these conversations matter for democracy. We don't take money from political groups - even a $5 donation helps us keep it that way.

Loading...Goal: 1,000 supporters
Loading...

Does DuckDuckGo mobile app use DNS over HTTPS (DoH) or DNS over TLS (DoT)?

Checked on November 9, 2025
Disclaimer: Factually can make mistakes. Please verify important info or breaking news. Learn more.

Executive Summary

The available reporting and issue-tracking documents show no definitive evidence that the DuckDuckGo mobile app currently forces DNS over HTTPS (DoH) or DNS over TLS (DoT) by default; requests and discussions about adding DoH/DoT or related encrypted-DNS features exist, but they are proposals rather than confirmations of implementation. GitHub issues and third-party reviews emphasize interest in encrypted DNS and note app behavior conflicts (notably with App Tracking Protection), but none of the cited materials present authoritative documentation or code proving that DuckDuckGo’s mobile app actively uses DoH or DoT as its DNS transport protocol [1] [2] [3].

1. Why users ask whether DuckDuckGo uses encrypted DNS — privacy promises meet technical ambiguity

Users ask whether DuckDuckGo employs DoH or DoT because encrypted DNS is a clear privacy improvement over plaintext DNS and DuckDuckGo markets privacy-friendly features. The public materials analyzed include GitHub feature requests and support pages that reference DNS practices broadly, such as using DuckDuckGo’s DNS servers or proposing Oblivious DoH (ODoH) and Encrypted Client Hello (ECH), but these are framed as roadmaps or requests rather than completed features. The 2019 GitHub issue explicitly requests DoH/DoT support and suggests opt-in configurability, underscoring user demand rather than current functionality; that issue remains a record of community interest and developer consideration [1] [4]. The distinction between marketing statements about privacy and the specific transport mechanism for DNS resolution is crucial because privacy claims do not automatically imply DoH/DoT implementation [5].

2. What the GitHub issue trail actually reveals — feature requests, incompatibilities, and absence of confirmations

The strongest documentary traces come from DuckDuckGo’s own GitHub issues and third‑party reporting. A 2019 issue requests DoH/DoT support for the Android app and frames the feature as desirable and opt‑in, but it does not indicate the feature was built into the app at that time. A separate GitHub discussion reports that DuckDuckGo’s App Tracking Protection can break connectivity when DoH interactions occur, implying incompatibility with certain DoH setups, yet the thread does not confirm that the app uses DoH by default; rather it documents edge cases when users enable tracking protections [1] [2]. This pattern — requests, experiments, bug reports — shows active interest and engineering discussion without a final, authoritative statement claiming DoH/DoT is in production in the mobile client [2] [1].

3. How DuckDuckGo’s help pages and product descriptions frame DNS — careful about semantics

DuckDuckGo help pages and product descriptions reference DNS-related services such as converting domain names, offering DNS servers, and protecting users via blocklists or VPN/Smarter Encryption tooling. These materials discuss DNS security and privacy at a conceptual level but stop short of specifying the transport protocol (DoH vs DoT vs plaintext) used by their mobile app. The help pages emphasize outcomes — less tracking and safer lookups — rather than the underlying protocol implementation details, leaving a gap between product-level privacy outcomes and technical transparency about whether DoH or DoT is used on mobile [6] [5]. Without explicit documentation or code references, the help content cannot be read as confirmation of DoH/DoT usage [3].

4. Third-party coverage and user reports add context but not conclusive proof

Independent reporting—including user experiences reported on tech sites and community issue trackers—documents that App Tracking Protection and other features can interact unpredictably with encrypted DNS technologies. A gHacks review of App Tracking Protection mentioned functionality without detailing DNS transport, and bug reports describe connectivity failures when DoH interactions are involved. These independent data points signal real-world friction and the active role of developers and users in testing, but they do not constitute a formal announcement that DuckDuckGo’s mobile app uses DoH or DoT by default. The balance of evidence is advisory and observational rather than declarative [7] [2].

5. Bottom line: current answer, uncertainties, and what to watch for

Based on the available materials, the prudent conclusion is that there is no documented, authoritative confirmation that DuckDuckGo’s mobile app currently implements DoH or DoT as its DNS transport; the repository of issues and help pages shows discussion, feature requests, and intermittent compatibility reports but stops short of claiming built-in DoH/DoT usage. Users concerned about DNS privacy should monitor DuckDuckGo’s official release notes, GitHub issue closures, and help-page updates for explicit statements or code changes referencing DoH, DoT, ODoH, or ECH, since the conversation and proposals in the public issue tracker indicate these topics are on DuckDuckGo’s engineering roadmap even if they have not been documented as shipped in the sources reviewed [1] [4] [3].

Want to dive deeper?
What is the difference between DNS over HTTPS and DNS over TLS?
How does DuckDuckGo implement privacy features in its mobile browser?
Do other privacy-focused search engines use DoH or DoT?
What are the benefits of encrypted DNS in mobile apps?
Has DuckDuckGo updated its DNS encryption recently?