Fact-checked by Grok 2 weeks ago

1.1.1.1

1.1.1.1 is a free public Domain Name System (DNS) resolver service launched by on April 1, 2018, in partnership with , designed to translate human-readable domain names into IP addresses for faster and more secure browsing while prioritizing user privacy by not selling personal data or retaining query logs beyond 24 hours for debugging purposes. Operated across Cloudflare's global network of over 330 cities, the service supports DNS Security Extensions (DNSSEC) for authentication and employs query name minimization to reduce privacy leakage by sending only necessary portions of domain queries to authoritative servers. It is recognized as one of the fastest public DNS resolvers, achieving average response times under 10 milliseconds worldwide according to independent benchmarks. To enhance security, 1.1.1.1 offers encrypted DNS protocols including (DoH) and (DoT), which protect queries from interception by ISPs or malicious actors, and it also provides a hidden service for users. An associated mobile app, , extends these benefits by routing all device traffic through an optimized, privacy-focused VPN-like connection. Additionally, the 1.1.1.1 for Families variant includes optional filtering to block domains and, if enabled, adult content, making it suitable for without compromising core speed or commitments.

Service Overview

Description

1.1.1.1 is a free, public recursive DNS resolver service launched by in 2018, aimed at delivering faster and more private domain name resolution than traditional DNS providers. Developed in partnership with , the service functions as a consumer-oriented tool to improve browsing speed and without requiring users to manage their own DNS infrastructure. At its core, 1.1.1.1 translates human-readable domain names, such as example.com, into machine-readable IP addresses that direct internet traffic to the correct servers. This resolution process utilizes anycast routing across Cloudflare's global network of over 330 cities, automatically directing queries to the nearest data center for minimal latency worldwide. By handling resolution recursively—fetching responses from authoritative servers on behalf of the user—the service ensures efficient, reliable performance without exposing end-user details to upstream providers. The resolver appeals to individuals, families, and organizations prioritizing in DNS operations, offering a no-logging policy that avoids storing personally identifiable information from queries. enforces strict data handling, deleting query logs within 24 hours and undergoing independent audits to confirm adherence to these privacy commitments. Adoption has grown significantly, with 1.1.1.1 processing approximately 1.9 trillion queries daily as of early 2025. collaborates with internet service providers and network equipment manufacturers to enable seamless integration and pre-configuration on routers and devices, broadening accessibility. For further privacy enhancement, it integrates with Cloudflare's WARP VPN service.

Key Features

1.1.1.1 distinguishes itself through robust commitments, ensuring users' data remains protected without commercial exploitation. The service does not log client addresses, preventing any tracking of individual users' locations or activities. Furthermore, explicitly states that it will not sell or share personal data from the public resolver with third parties, nor use such data for , setting it apart from many other DNS providers. Identifying logs, such as query data, are deleted within 24 hours to minimize retention risks. These policies are verified annually through independent third-party privacy examinations, with results publicly announced to demonstrate compliance. Performance is another core strength, achieved via strategic infrastructure optimizations. By partnering with multiple root providers like and leveraging an network, 1.1.1.1 routes queries efficiently to the nearest server. Edge caching further reduces by storing frequent query responses locally, enabling average worldwide query times of around 11 according to independent benchmarks, with sub-10 performance common in many regions due to proximity to Cloudflare's global points of presence. This results in one of the fastest public DNS resolvers available. For enhanced security, 1.1.1.1 offers optional filtering modes tailored for protection against threats. The malware-blocking variant, accessible via IP addresses 1.1.1.2 and 1.0.0.2, prevents resolution of domains associated with malicious software, including sites, , and other threats identified through curated blocklists. The family-safe mode, using 1.1.1.3 and 1.0.0.3, extends this by additionally filtering adult content, such as and nudity-related sites, to create a safer browsing environment for households. These modes rely on real-time threat intelligence without compromising the base resolver's speed or privacy. Accessibility is prioritized to make the service easy to adopt across devices and networks. Users can configure 1.1.1.1 directly on operating systems like , , Windows, and macOS through built-in DNS settings. Dedicated mobile apps for and simplify setup, automatically applying the resolver on any network and supporting filtering modes. For broader coverage, router-level configuration enables whole-network usage, compatible with popular models from brands like and others via admin panels.

History

Launch and Development

Cloudflare began developing 1.1.1.1 in late , committing significant network and support resources approximately six months prior to its public release to tackle escalating issues in DNS , including the widespread practice of ISPs logging and monetizing user browsing histories through unencrypted queries. The initiative stemmed from 's recognition that traditional DNS services often exposed users to by network operators, who could track every domain visited without consent. The service was officially announced and launched on April 1, 2018, marking Cloudflare's first consumer-oriented offering aimed at delivering a faster, privacy-focused alternative to existing public DNS resolvers like those from and . This rollout was enabled through a strategic partnership with , the Asia-Pacific Network Information Centre, which allocated the distinctive IPv4 addresses 1.1.1.1 and 1.0.0.1—previously unassigned due to their simplicity—for exclusive use in this recursive DNS project under a research agreement. From inception, 1.1.1.1 emphasized user privacy by committing not to log identifying IP addresses and to delete query logs within 24 hours, audited independently to verify compliance. Initial adoption was driven by heightened public awareness of ISP data practices, particularly following regulatory scrutiny in regions like the , where net neutrality debates amplified concerns over . Although no public beta was conducted, internal testing ensured the service's readiness, and it supported queries via addresses 2606:4700:4700::1111 and 2606:4700:4700::1001 from day one to accommodate modern network standards. Within months, 1.1.1.1 achieved rapid growth, handling tens of gigabits per second in traffic as privacy advocates and tech enthusiasts switched. Key early developments expanded the service's privacy ecosystem. On June 5, 2018, introduced the Hidden Resolver, an onion service enabling DNS queries over to shield users from even resolver-level tracking. Later, on April 1, 2020, the 1.1.1.1 for Families initiative launched, integrating optional and adult content filtering while maintaining core privacy guarantees. These enhancements solidified 1.1.1.1's role in promoting accessible, secure DNS amid ongoing debates over .

Operational Incidents

One of the early operational challenges for 1.1.1.1 occurred in June , when a issue with Verizon's network disrupted traffic to Cloudflare's data centers, leading to intermittent DNS failures for users relying on the . This incident highlighted vulnerabilities in arrangements for anycast deployment, with resolution achieved by rerouting traffic through alternative paths after coordination with the ISP, restoring full functionality within hours. In July 2020, a partial outage affected 1.1.1.1 due to a BGP misconfiguration in Cloudflare's , causing widespread unavailability of the DNS resolver for approximately 27 minutes and impacting services like , , and others that depend on it. The root cause was an erroneous update that withdrew critical routes, preventing queries from reaching edge servers; mitigation involved immediate rollback of the configuration and enhanced validation checks for BGP announcements to prevent similar errors. A security-related incident emerged in September 2025, when disclosed the unauthorized issuance of multiple TLS certificates for 1.1.1.1 domains by Fina CA, with at least three certificates issued in May 2025 and discovered in August 2025. In total, twelve such certificates were issued between February 2024 and August 2025 without , potentially enabling man-in-the-middle attacks on encrypted DNS traffic like or , though no actual misuse was observed. responded by revoking all affected certificates, notifying logs, and implementing stricter controls with certificate authorities, including automated monitoring for unauthorized issuances tied to their domains. More recently, on July 14, 2025, Cloudflare made a change to its service topologies that caused a 62-minute outage for 1.1.1.1 on the edge, resulting in downtime for customers using the public DNS Resolver as well as intermittent degradation for Gateway DNS. This affected the majority of users, with intermittent issues also impacting Gateway DNS, and disrupted broader internet access for those dependent on the resolver. Resolution was achieved by isolating the misconfigured and re-advertising correct routes via BGP, with subsequent mitigations including improved testing protocols for updates and decoupling of legacy systems. Cloudflare maintains transparency in its incident response by publishing detailed post-mortems on its official for major events, including timelines, root cause analyses, and preventive measures, which has become a standard practice to build trust and inform the community on reliability improvements. These reports emphasize rapid detection through internal monitoring and coordinated recovery efforts, contributing to ongoing enhancements in service resilience.

Technical Implementation

IP Addresses and Infrastructure

The primary IP addresses for the 1.1.1.1 DNS resolver are 1.1.1.1 and 1.0.0.1 for IPv4, and 2606:4700:4700::1111 and 2606:4700:4700::1001 for , used for standard resolution with the latter two serving as secondary or backup addresses to enhance reliability. These addresses were specifically allocated by the Network Information Centre () to for the public DNS service as part of a joint research and operational partnership. Historically, the addresses 1.1.1.1 and 1.0.0.1 were held by 's research group within the 1.0.0.0/8 block, which was allocated to by the (IANA) in 2010 after being reserved for future use. Prior to this formal allocation, these addresses were commonly employed in the for testing and purposes in early networking configurations, leading to their frequent appearance as examples in software, tutorials, and setups worldwide. This widespread informal usage made the addresses effectively unusable for production deployment without intervention. In preparation for the service launch on April 1, 2018, initiated a six-month cleanup process to reassign the addresses globally. This involved automated scanning of the to detect active usages and misconfigured routes pointing to 1.1.1.1 and 1.0.0.1, followed by notifications to affected network operators and legacy users to update their systems. The effort identified only minimal active conflicts, resulting in few disruptions and enabling broad reachability post-launch. The underlying infrastructure leverages anycast routing on Cloudflare's global network, which as of 2025 encompasses 330 cities across more than 125 countries. This distributed edge server architecture ensures redundancy by advertising the same IP addresses from multiple locations, routing queries to the closest server for minimal latency and high fault tolerance.

Supported Protocols

1.1.1.1 supports DNS over HTTPS (DoH) as a primary encrypted protocol, implemented since its launch in 2018 to secure DNS queries by encapsulating them within HTTPS traffic on port 443. This allows DNS requests to masquerade as standard web traffic, reducing the risk of interception, with the primary endpoint at https://1.1.1.1/dns-query supporting HTTP/2 and HTTP/3 for efficient multiplexing. DNS over TLS (DoT) is also available, providing end-to-end encryption for DNS queries on port 853 in compliance with RFC 7858, ensuring protection against eavesdropping and tampering through standard TLS handshakes. Clients verify the connection using certificates issued for cloudflare-dns.com, which includes the IP addresses 1.1.1.1 and 1.0.0.1 in the subject alternative names. In addition to these, 1.1.1.1 offers DNS over Tor for enhanced anonymity, routing queries through the Tor network to conceal the user's IP address from the resolver while preventing the ISP from observing DNS activity. As a fallback for unencrypted scenarios, standard DNS operates over UDP and TCP on port 53, using the binary wire format defined in RFC 1035 for queries and responses, with error handling via standard DNS response codes such as NXDOMAIN for non-existent domains or SERVFAIL for server failures. Protocol support has evolved to include Oblivious DoH (ODoH) starting in late , a privacy-enhancing extension that separates query from resolution to prevent the DNS resolver from linking queries to client identities, implemented via and roles with endpoints like odoh.cloudflare-dns.com. These protocols integrate with the to tunnel DNS traffic securely, though detailed tunneling mechanics are covered in the WARP VPN section.

Privacy and Security

's 1.1.1.1 DNS resolver operates under a strict no-logging for user addresses, ensuring that full addresses are never stored or logged to disk. Query logs are anonymized by truncating the last octet of the and retained only temporarily for and , with all such data deleted within 25 hours. This approach minimizes while allowing essential operational oversight, and publishes semi-annual reports detailing government and requests for user data, none of which involve selling or sharing DNS query information. To verify adherence to these privacy commitments, committed to annual third-party audits by since the service's launch in 2018, with the initial comprehensive review completed in 2020 confirming no retention of full IP addresses or beyond the stated policy and no sales of user information. On the security front, 1.1.1.1 leverages 's global network, which provides built-in capabilities capable of absorbing and filtering large-scale attacks at the edge without impacting resolver availability. In filtered modes like 1.1.1.2 ( blocking) and 1.1.1.3 (family protection), the service actively scans and blocks DNS resolutions to known malicious or domains using 's threat intelligence feeds. Regarding the 2025 unauthorized TLS certificate issuance incident, where multiple certificates for 1.1.1.1 were improperly issued by a third-party certification authority, promptly investigated, coordinated revocations through certificate transparency logs, and enhanced monitoring to prevent recurrence, with no evidence of exploitation or service disruption. The service complies with the General Data Protection Regulation (GDPR) as a data processor, implementing measures like data minimization, of logs, and user consent mechanisms where applicable, while explicitly stating no participation in government surveillance programs or data-sharing alliances beyond legal requirements. For family modes, data handling follows the same anonymized and short-retention policy, with no additional logging of blocked queries or user identifiers to protect household .

WARP VPN

WARP VPN is a free (VPN) service provided by that extends the 1.1.1.1 DNS resolver by routing all device internet traffic through Cloudflare's global network, encrypting connections to protect against interception and using 1.1.1.1 for secure DNS resolution. It employs the protocol, a lightweight and efficient VPN standard, to create secure tunnels without the overhead of traditional VPNs, ensuring that data is encrypted end-to-end while leveraging Cloudflare's edge infrastructure for optimized routing. This integration allows users to access the internet with improved privacy and performance, as traffic is anonymized and protected from on-path attacks. Launched in 2019 as a consumer extension of the 1.1.1.1 service, WARP was initially released for iOS and Android mobile apps, with desktop support for Windows, macOS, and Linux following in subsequent updates to broaden accessibility. The service includes split-tunnel options, enabling users to selectively route specific traffic through the VPN while allowing other connections to bypass it for customized control over privacy and performance. Available via dedicated apps across these platforms, WARP operates in a full-tunnel mode by default but supports configurations for partial routing to suit individual needs. It also supports the MASQUE protocol for encrypted traffic routing to Cloudflare's network. In terms of performance and security, adopts a zero-trust as part of 's broader , verifying each connection without assuming trust in the underlying network, which minimizes risks from untrusted or cellular connections. commits to no of traffic content, destinations, or user activities, aligning with its privacy-focused DNS practices to ensure that only anonymized is retained for service improvement. By integrating directly with 's edge servers—spanning over 330 cities worldwide— avoids the latency penalties common in legacy VPNs, delivering faster speeds through optimized paths and content delivery. For enterprise users, integrates with Cloudflare One, providing advanced zero-trust access controls and device management features. Upgraded speed tiers are available through , which offers enhanced performance optimizations.

WARP+ Enhancements

WARP+ is a premium subscription tier of Cloudflare's service, introduced in September 2019 alongside the initial launch of . It enhances the base service by incorporating Argo Smart Routing, which dynamically selects optimal paths across Cloudflare's of over 330 cities to avoid congestion and reduce . This results in average performance improvements of up to 30% faster connections compared to standard internet routing. The WARP+ Unlimited plan operates on a subscription model priced at $4.99 per month or equivalent regional rates, providing unlimited access to routing without the limitations of the free tier's referral-based bonuses. Initially, users could earn limited free WARP+ data—starting at 1 GB per referral invite—with no cap on total earnings but requiring a subscription for unrestricted use. This upgrade eliminates any data constraints on the enhanced routing features, allowing continuous high-speed performance for activities like streaming and . Beyond speed optimizations, WARP+ includes access to advanced security integrations within the 1.1.1.1 app ecosystem, such as enhanced threat blocking through Gateway policies that filter malicious domains in real-time. It also supports seamless configuration with 1.1.1.1 for Families, enabling and adult content blocking modes directly in the WARP client for family-oriented protection. While WARP+ primarily focuses on performance, these features extend its utility for secure, unrestricted access. As of November 2025, WARP+ has seen ongoing refinements, with the November release of version 2025.9.558.0 for desktop clients introducing minor fixes and stability improvements across Windows, macOS, and platforms, following the 2025.8.779.0 update. These updates ensure compatibility and reliability for the premium tier, building on Cloudflare's commitment to evolving the service for mobile and desktop users.

References

  1. [1]
    Announcing 1.1.1.1: the fastest, privacy-first consumer DNS service
    Apr 1, 2018 · 1.1.1.1 has 4 1s. So it seemed clear that 4/1 (April 1st) was the date we needed to launch it. 1.1.1.1. Never mind that it was a Sunday ...
  2. [2]
    1.1.1.1 Public DNS Resolver - Cloudflare Docs
    Mar 27, 2024 · Cloudflare, in partnership with APNIC, runs the 1.1.1.1 public resolver, a recursive DNS service that values user privacy and security.Verify connection · Cloudflare Resolver for Firefox · DNS in Google Sheets
  3. [3]
    What is 1.1.1.1? - DNS - Cloudflare
    1.1.1.1 is a public DNS resolver operated by Cloudflare that offers a fast and private way to browse the Internet. Unlike most DNS resolvers, 1.1.1.1 does not ...
  4. [4]
    1.1.1.1 (DNS Resolver) - Cloudflare Docs
    Aug 13, 2025 · 1.1.1.1 is Cloudflare's public DNS resolver. It offers a fast and private way to browse the Internet. DNS resolvers translate domains like ...IP addresses · Set up · Android · Verify connection
  5. [5]
  6. [6]
  7. [7]
    Introducing 1.1.1.1 for Families - The Cloudflare Blog
    Apr 1, 2020 · 1.1 can safeguard user privacy and optimize efficiency, it is designed for direct, fast DNS resolution, not for blocking or filtering content.
  8. [8]
    Introducing DNS Resolver, 1.1.1.1 (not a joke) - The Cloudflare Blog
    Apr 1, 2018 · The DNS resolver, 1.1.1.1, is available publicly for everyone to use - it is the first consumer-focused service Cloudflare has ever released.
  9. [9]
    One of the Internet's Fastest, Privacy-First DNS Resolver
    1.1.1.1 is a partnership between Cloudflare and APNIC. Cloudflare runs one of the world's largest, fastest networks.
  10. [10]
    What is Anycast DNS? | How Anycast works with DNS - Cloudflare
    Because the CDN is Anycast, DNS queries can be resolved from any data center in the network. Any DNS resolver in the network can respond to any DNS query.
  11. [11]
    Announcing the Results of the 1.1.1.1 Public DNS Resolver Privacy ...
    Mar 31, 2020 · We took a big step toward improving Internet privacy and security with the launch of the 1.1.1.1 public DNS resolver.Missing: billions daily
  12. [12]
    Cloudflare partners with Internet Service Providers and network ...
    Sep 24, 2024 · Today, we serve 1.7 trillion queries per day for 1.1.1.1 and our network presence spans over 330 cities and interconnects with over 12,500+ ...
  13. [13]
    Cloudflare 15th Birthday Timeline
    1.1.1.1 has a strict privacy policy: the resolver never stores client IP addresses, and all query logs are deleted within 24 hours. By leveraging its ...
  14. [14]
    DNS Performance for 1.1.1.1 DNS | DNSperf
    A free DNS resolver by Cloudflare (1.1.1.1 1.0.0.1). Uptime: 99.28%. Query Time: 11 ms. 1.1.1.1 Worldwide Uptime. Type: Uptime Quality.
  15. [15]
    Set up Cloudflare 1.1.1.1 resolver
    Jun 19, 2025 · You can set up 1.1.1.1 for Families to encrypt your DNS queries over HTTPS. This prevents spoofing and tracking by malicious actors, advertisers, ISPs, and ...Android · macOS · Windows · Router
  16. [16]
    Set up 1.1.1.1 on Android - Cloudflare Docs
    Aug 20, 2025 · Android 11 or later · Go to Settings > Network & internet. · Select Advanced > Private DNS. · Select the Private DNS provider hostname option.Set up 1.1.1.1: Faster Internet · Configure 1.1.1.1 manually · Android 11 or later
  17. [17]
    Set up 1.1.1.1 on a router - Cloudflare Docs
    Aug 20, 2025 · In the admin console, find the place where DNS settings are set. This may be contained within categories such as WAN and IPv6 (Asus Routers) or ...<|control11|><|separator|>
  18. [18]
    Fixing reachability to 1.1.1.1, GLOBALLY! - The Cloudflare Blog
    Apr 10, 2018 · Recently we announced our fast, privacy-centric DNS resolver 1.1.1.1, supported by our global network. As you can see 1.1.1.1 is very easy to ...Missing: pre- | Show results with:pre-<|control11|><|separator|>
  19. [19]
    1.1.1.1 Launches to Make the Internet Faster and More Private for ...
    Apr 1, 2018 · Some DNS providers even sell data about users' Internet activity or use it to deploy targeted ads. With 1.1.1.1, there is now an alternative.<|separator|>
  20. [20]
    APNIC Labs enters into a research agreement with Cloudflare
    Apr 2, 2018 · APNIC will use two IPv4 address prefixes for this joint research program, 1.0.0/24 and 1.1.1/24. These are address prefixes that the Regional ...Missing: collaboration | Show results with:collaboration
  21. [21]
    WARP is here (sorry it took so long) - The Cloudflare Blog
    Sep 25, 2019 · At some level, we thought it would be easy. We already had the 1.1.1.1 App that was securing DNS requests running on millions of mobile devices.
  22. [22]
    Introducing DNS Resolver for Tor - The Cloudflare Blog
    Jun 5, 2018 · In case you haven't heard yet, Cloudflare launched a privacy-first DNS resolver service on April 1st. ... 1.1.1.1TorPrivacyDNSResolverCryptography.<|control11|><|separator|>
  23. [23]
    Cloudflare Outage History (2019-2025) - Control D
    Apr 8, 2025 · On March 21, 2025, Cloudflare crashed with a global outage lasting 1 hour and 7 minutes, caused by total write failures and partial read ...
  24. [24]
    Cloudflare outage on July 17, 2020
    Jul 18, 2020 · A configuration error in our backbone network caused an outage for Internet properties and Cloudflare services that lasted 27 minutes.Missing: misconfigurations | Show results with:misconfigurations
  25. [25]
    Cloudflare outage takes down Discord, Shopify, Politico and others
    Jul 17, 2020 · Many major websites and services were unreachable for a period Friday afternoon due to issues at Cloudflare's 1.1.1.1 DNS service.
  26. [26]
    Addressing the unauthorized issuance of multiple TLS certificates for ...
    Sep 4, 2025 · Unauthorized TLS certificates were issued for 1.1.1.1 by a Certification Authority without permission from Cloudflare.
  27. [27]
    TLS Certificate Mis-Issuance Exposes 1.1.1.1 DNS Service to ...
    Sep 4, 2025 · Security researchers revealed that three unauthorized TLS certificates were issued in May 2025 for 1.1.1.1, public DNS service.
  28. [28]
    Mis-issued certificates for 1.1.1.1 DNS service pose a threat to the ...
    Sep 3, 2025 · In an emailed statement sent several hours after this post went live, Cloudflare officials confirmed the certificates were improperly issued.
  29. [29]
    Cloudflare 1.1.1.1 incident on July 14, 2025
    Jul 15, 2025 · Cloudflare announces these anycast routes to the Internet in order for traffic to those addresses to be delivered to a Cloudflare data center, ...
  30. [30]
    Cloudflare Outage Analysis: July 14, 2025 - ThousandEyes
    Jul 14, 2025 · Before Cloudflare adopted this address range in 2018, 1.1.1.1 had been commonly used for testing and internal network configurations. This ...
  31. [31]
    IP addresses - 1.1.1.1 - Cloudflare Docs
    Aug 13, 2024 · 1.1.1.1 is Cloudflare's public DNS resolver. It offers a fast and private way to browse the Internet. IPv4, IPv6. 1.1.1.1 1.0 ...
  32. [32]
    Issues with allocating from 1.0.0.0/8 - BGPmon
    Jan 24, 2010 · This week it was announced that IANA has allocated 1.0.0.0/8 to APNIC. This prefix must look familiar to many as we see it often in examples ...
  33. [33]
    Cloudflare Global Network | Data Center Locations
    Data Center Locations. View Cloudflare's system status. North America. Albuquerque, US*. Anchorage, US. Ashburn, US*. Atlanta, US*. Austin, US*. Bangor, US*.
  34. [34]
  35. [35]
    DNS over HTTPS - 1.1.1.1 - Cloudflare Docs
    Oct 9, 2025 · With DNS over HTTPS (DoH), DNS queries and responses are encrypted and sent via the HTTP, HTTP/2 and HTTP/3 protocols. DoH ensures that ...Connect to 1.1.1.1 using DoH... · Configure DoH on your browser · Using JSON
  36. [36]
    DNS over TLS - 1.1.1.1 - Cloudflare Docs
    Nov 19, 2024 · DNS over TLS (DoT) is one way to send DNS queries over an encrypted connection. Cloudflare supports DNS over TLS on standard port 853 and is compliant with RFC ...
  37. [37]
    DNS over Tor · Cloudflare 1.1.1.1 docs
    Oct 9, 2025 · Before you start, head to the Tor Project website ↗ to download and install a Tor client. If you use the Tor Browser, it will automatically ...
  38. [38]
    Oblivious DNS over HTTPS - 1.1.1.1 - Cloudflare Docs
    Mar 3, 2025 · Cloudflare 1.1.1.1 supports ODoH by acting as a target that can be reached at odoh.cloudflare-dns.com. To make ODoH queries you can use open source clients.Missing: 2021 | Show results with:2021
  39. [39]
    Oblivious DNS over HTTPS (ODoH): A Practical Privacy ...
    Recent efforts to secure DNS using DNS over TLS (DoT) and DNS over HTTPS (DoH) have been gaining traction, ostensibly protecting DNS messages from third parties ...
  40. [40]
    Cloudflare Transparency Report
    Cloudflare publishes semi-annual updates to our Transparency Report on requests to disclose customer information or to take action against content on websites ...Missing: quarterly | Show results with:quarterly
  41. [41]
    Cloudflare's 1.1.1.1 DNS Passes Privacy Audit, Some Issues Found
    Mar 31, 2020 · Public Resolver Logs are deleted from Cloudflare's data warehouse within 25 hours via retention configurations on the database table storing the ...
  42. [42]
    Cloudflare and GDPR compliance
    Oct 13, 2023 · Learn how Cloudflare processes data on behalf of our customers, and how companies can use our network to help meet their GDPR obligations.
  43. [43]
    Introducing WARP: fixing mobile Internet performance and security
    yes, again, geeky — we launched Cloudflare's first mobile app. The 1.1.1.1 App allowed anyone to easily take advantage of the speed, ...
  44. [44]
    Overview · Cloudflare WARP client docs
    Oct 21, 2025 · The Cloudflare WARP client allows individuals to have a faster, more secure, and more private experience online.Windows · macOS · WARP modes · Get started
  45. [45]
    Split Tunnels · Cloudflare One docs
    Oct 28, 2025 · Split Tunnels can be configured to exclude or include IP addresses or domains from going through WARP. This feature is commonly used to run WARP ...Change Split Tunnels mode · Add a route · Domain-based Split Tunnels
  46. [46]
    About Cloudflare WARP
    Oct 23, 2025 · The Cloudflare WARP client allows you to protect corporate devices by securely and privately sending traffic from those devices to ...Download WARP stable... · First-time setup · Update WARP · Deploy WARP
  47. [47]
    Privacy · Cloudflare WARP client docs
    Sep 23, 2025 · The WARP Client application uses a VPN profile and/or service that enables us to intercept and secure your DNS queries and to transmit data ...
  48. [48]
    Argo Smart Routing | Accelerate Web Apps - Cloudflare
    Argo Smart Routing detects and routes around real-time network congestion for 30% (on average) faster web app performance.Missing: introduction 2020
  49. [49]
    How do I subscribe to WARP and WARP+ Unlimited?
    Nov 1, 2024 · To subscribe to WARP+Unlimited, you can purchase a subscription. The price for the subscription is located on the button at the bottom of the 1.1.1.1 app home ...
  50. [50]
    How To Use 1.1.1.1 w/ WARP App And Cloudflare Gateway To ...
    Apr 8, 2020 · By adding Cloudflare Gateway's secure DNS filtering to your 1.1.1.1 app, you can add a layer of security and block malicious domains flagged ...Missing: spoofing | Show results with:spoofing<|separator|>
  51. [51]
    WARP client for Windows (version 2025.8.779.0) · Changelog
    A new GA release for the Windows WARP client is now available on the stable releases downloads page. This release contains minor fixes and ...Missing: battery | Show results with:battery
  52. [52]
    WARP client for macOS (version 2025.8.779.0) · Changelog
    A new GA release for the macOS WARP client is now available on the stable releases downloads page. This release contains minor fixes and ...Missing: battery efficiency