Kicksecure('s servers) would be the best candidate for a recursive resolver, similar to how the GrapheneOS team uses their own servers:
This proposal reuses the same trust already provided from Kicksecure users, so only the technical implementation remains unaddressed. Here are a few base suggestions:
- DNSSEC-validated cached queries
- DoT/DoH(3)/DoQ/DNSCrypt from stub resolver to recursive resolver
Here are a few technical stretch goals:
- QNAME minimization[1] and aggressive NSEC(3) records[2]
- Opportunistic DNS encryption (DoT and DoQ) from recursive resolver to authoritative servers[3]
- Tor onion service similar to Cloudflare’s deployment[4]
I will be going though a lot of documentation/references about DNS during April for my own security and privacy needs, so I can provide step-by-step deployment instructions for the base suggestions if necessary, assuming a Debian(-like) cloud image.