"When a Quad9 user clicks on a website link or types an address into a web browser, Quad9 checks the site against IBM X-Force's threat intelligence database of more than 40 billion analysed web pages and images. The service also taps feeds from 18 further threat intelligence partners, including Abuse.ch, the Anti-Phishing Working Group, Bambenek Consulting, F-Secure, mnemonic, 360Netlab, Hybrid Analysis GmbH, Proofpoint, RiskIQ and ThreatSTOP."<p>Why not share the database with the public? This is meant to be a free service, isn't it?<p>"Quad9 is designed to provide these protections without affecting the speed that users expect when accessing websites and services."<p>Very careful choice of words. It does not say it will not affect the speed. It says it will not affect the "speed which user expect". What speed is that?<p>I already check domains against a database of ones I want to block. I do this locally using djbdns, without needing to send DNS queries over the internet. The speed is better than any third party DNS service, including 8.8.8.8 or 9.9.9.9. IMO, there is no need to send personal, private DNS queries to "18 further threat intelligence providers".<p>"Telemetry data on blocked domains from Quad9 will be shared with threat intelligence partners to improve their threat intelligence responses for their customers and Quad9."<p>Telemetry. So they are collecting data about users' DNS queries. This would explain how the service is "free".<p>When a user tries to access a blacklisted domain, a host of "threat intelligence partners" are notified.<p>"PCH, which provides Quad9's network infrastructure; and IBM, which provides IBM X-Force threat intelligence and the easily memorable IP address (9.9.9.9)."<p>Quad9 suggests IP addresses can be memorized. I will rememeber that.<p>"The personal information protections and selectable DNS encryption, DNSSEC, and blocklist that are in place show that this project is in line with PCH's values," he said. "Quad9 will inspire trust in both individuals and businesses who understand the importance of securing their private browsing data."<p>If someone digitally signs a document, does anyone believe the document is hence "encrypted"?<p>When DNSSEC is used, does anyone believe that DNS is hence "encrypted"?<p>A less misleading description might be something like "DNS record signing".<p>Using DNSSEC does not mean the DNS packets are encrypted. Anyone sniffing the network can read them.<p>DNSSEC also makes DDOS easier for malfeasants.<p>Have those providing the DNSSEC signed records and those providing DNSSEC enabled third party DNS service solved this problem yet?<p>I am not implying that this "service" could not be useful for users who <i>must</i> use third party DNS service. The question is whether users who really care about security issues <i>must</i> use third party DNS services.<p>source: <a href="http://www.computerweekly.com/news/450430188/Free-Quad9-internet-threat-protection-launched" rel="nofollow">http://www.computerweekly.com/news/450430188/Free-Quad9-inte...</a><p>"HQ<p>1442 A Walnut Street<p>Suite 501<p>Berkeley CA 94709"<p>source: <a href="https://www.quad9.net" rel="nofollow">https://www.quad9.net</a><p>Is this an office of IBM?