<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Dot on Pi Stack</title><link>https://www.pistack.xyz/tags/dot/</link><description>Recent content in Dot on Pi Stack</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Thu, 16 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://www.pistack.xyz/tags/dot/index.xml" rel="self" type="application/rss+xml"/><item><title>Complete Guide to Self-Hosted DNS-over-TLS Resolvers 2026</title><link>https://www.pistack.xyz/posts/self-hosted-dns-over-tls-resolver-stubby-unbound-knot-2026/</link><pubDate>Thu, 16 Apr 2026 00:00:00 +0000</pubDate><guid>https://www.pistack.xyz/posts/self-hosted-dns-over-tls-resolver-stubby-unbound-knot-2026/</guid><description>&lt;p>Every DNS query your devices send travels in plain text by default. That means your ISP, network administrator, or anyone with access to the network path can see every domain you look up. DNS-over-TLS (DoT) fixes this by encrypting the entire DNS conversation inside a TLS tunnel on port 853, the same cryptographic protection you get from HTTPS.&lt;/p></description></item></channel></rss>