Add turn off DoH for Mullvad Browser when using a VPN

Requesting to add this recommendation since there’s no advantage to use DoH when connected to a VPN. DoH is there by default because Mullvad can’t assume Mullvad Browser users are using a VPN and DNS requests are encrypted. When using a VPN, DOH/DOT (or any other form of encrypted DNS) with third-party servers will simply add more entities to trust and does absolutely nothing to improve your privacy/security. Also turning off DoH when using a VPN does not reduce the fingerprinting protections Mullvad Browser provides.

1 Like

Doesn’t Mullvad Browser use it’s own DoH though? Because they offer that to pretty much anyone for free. You should still obviously shut it off if you’re using a VPN (especially if you’re using a 3rd party VPN and, for whatever reason, enjoy Mullvad Browser but don’t trust their VPN service.) but I don’t think you have to worry about trusting another party if you’re already using Mullvad VPN. Unlike stock Firefox, which I think uses Cloudfare DoH.