This is the multi-page printable view of this section. Click here to print.

Return to the regular view of this page.

Public Services

Free public service guide: encrypted DNS access rules for basic ad-blocking and privacy protection, selection advice, and enabled subscription lists.

We provide free public services and have curated a set of widely-used domain lists.

Public Service Rules

The public service employs balanced ad-blocking rules; false positives or misses may occur. The rule lists are:

Some users configure extra protection for elderly family members, so we also include security-blocking rules:

Additionally, the public service includes the following rules to block stubborn ads on certain phones that cannot be removed by conventional means:

# huawei search && browser
hisearch-drcn.dt.dbankcloud.com
uc-drcn.hispace.dbankcloud.cn
connect-drcn.hispace.hicloud.com
adx-drcn.op.dbankcloud.cn
hisearch-static-drcn.dbankcdn.com
||configserver.hicloud.com
||configserver.platform.hicloud.com
||configdownload.dbankcdn.cn
||browsercfg-drcn.cloud.dbankcloud.cn

Usage Notes

Because the public service is intended for the general population, it cannot accommodate personalized needs. Some users complain that ad-blocking is insufficient, while others report that false positives prevent game logins. We apologize that the public service cannot satisfy everyone; content that some view as ads may be useful information to others. In such cases, we tend to prioritize users who consider it useful.

When a false positive prevents WeChat or Alipay mini-programs from loading, simply disable the phone’s encrypted DNS setting temporarily to access the required service. However, based on our operational experience, many users do not know what to do when a service fails to work properly, so we must consider non-technical users’ experience.

Users familiar with DNS who encounter false positives or insufficient blocking should consider purchasing a private service.

Private services offer access logs, blocking logs, statistics, custom rules, authoritative resolution, and more to meet individual needs.

For other common requests,

Need help?

Contact on WeChat private6688
or Send email service1@nullprivate.com
Please describe your issue in detail, and we will respond as soon as possible.

Setup Instructions by Platform

Android

Android has natively supported DNS over TLS (DoT) since Android 9; phones released after 2019 are compatible. Enable it as follows:

  1. Open Settings
  2. Go to More connections
  3. Open Private DNS
  4. Choose Private DNS provider hostname and enter: public.adguardprivate.com

Self-hosted DNS can be implemented in many ways (e.g., AdGuard, dnsmasq, clash), but only native DoT has zero impact on phone performance. It requires no third-party apps, no permissions, no resources, and does not affect battery life. Therefore, native DoT encrypted DNS is recommended.

iPhone

iOS 14 and later natively support DNS over HTTPS (DoH) and DNS over TLS (DoT). Enable it as follows:

  1. Open Safari, download the profile: dot.mobileconfig
  2. Open Settings
  3. Go to General
  4. Open VPN & Device Management
  5. Select Install Profile

macOS

macOS Big Sur and later natively support DNS over HTTPS (DoH) and DNS over TLS (DoT). Enable it as follows:

  1. Open Safari, download the profile: dot.mobileconfig
  2. Open System Preferences
  3. Go to Network
  4. Select VPN & Device Management
  5. Choose Install Profile

1 - Android

A detailed guide on configuring DNS encryption on Android phones from various brands

Feature Overview

Android 9 and above natively supports DNS over TLS (DoT) encryption, protecting DNS queries from eavesdropping and tampering.

Setup Instructions

The exact menu path differs by brand; below are the steps for the most common manufacturers:

Xiaomi / Redmi

  1. Open Settings
  2. Select Connection & Sharing
  3. Tap Private DNS
  4. Choose Private DNS provider hostname
  5. Enter: public.adguardprivate.com

Samsung

  1. Open Settings
  2. Select Connections
  3. Tap More connection settings
  4. Choose Private DNS
  5. Select Private DNS provider hostname
  6. Enter: public.adguardprivate.com

OPPO / OnePlus

  1. Open Settings
  2. Select Wi-Fi & Network
  3. Tap Private DNS
  4. Choose Private DNS provider hostname
  5. Enter: public.adguardprivate.com

Other Brands

Look for the setting via:

  • Search for “DNS” or “Private DNS” in Settings
  • Check Network settings or Advanced network options

FAQ

How do I verify the configuration?

  1. After saving, the system automatically validates the DNS server
  2. If you see “Connected” or a checkmark, the setup succeeded

Troubleshooting setup failures

  1. Ensure the hostname is entered exactly as shown
  2. Verify your network connection is active
  3. Confirm your Android version supports DoT (requires Android 9 or higher)

Setup Demo

2 - iPhone

Detailed instructions on how to configure DNS encryption on an iPhone

Feature Overview

Starting with iOS 14, the iPhone natively supports encrypted DNS features, including:

  • DNS over HTTPS (DoH) – encrypts DNS queries via the HTTPS protocol
  • DNS over TLS (DoT) – encrypts DNS queries via the TLS protocol

These features effectively protect your network privacy and prevent DNS hijacking.

Configuration Steps

1. Download the Profile

Use Safari to download the profile: dot.mobileconfig

2. Install the Profile

  1. Open the Settings app
  2. Go to General > VPN & Device Management
  3. Select and install the public.adguardprivate.com DoT profile

Special Notes

If you have iCloud Private Relay enabled, you need to:

⚠️ Security Warning
Be extremely cautious when installing profiles. The profiles provided here are intended solely for legitimate privacy protection and ad-filtering services.
Do not install profiles from unknown sources, as they may compromise your device’s security.

Configuration Demo Video

3 - macOS

Detailed instructions on how to configure DNS encryption on macOS

macOS Big Sur and later natively support DNS over HTTPS (DoH) and DNS over TLS (DoT). You can enable encrypted DNS as follows:

  1. Open the built-in Safari browser and download the configuration file: dot.mobileconfig
  2. Open System Settings
  3. Go to Privacy & Security
  4. Select Profiles
  5. Under “Downloaded,” choose public.adguardprivate.com DoT to install

Please note that this is an unconventional way to modify system settings. We generally advise iPhone users not to install configuration files from unknown sources unless you are certain of their origin. This site provides legitimate personal-privacy protection and ad-blocking services and will never perform any actions that are harmful or objectionable to users. This disclaimer is intended to remind you that, even if you trust me, you should not readily trust configuration files provided by other websites. I will cover the potential risks of modifying system DNS settings in this manner in another article.

The complete contents of the configuration file are shown below. You can copy the text and paste it into your iPhone’s settings, or simply click the link above to download the file.

<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
<plist version="1.0">
	<dict>
		<key>PayloadContent</key>
		<array>
			<dict>
				<key>DNSSettings</key>
				<dict>
					<key>DNSProtocol</key>
					<string>TLS</string>
					<key>ServerName</key>
					<string>public.adguardprivate.com</string>
				</dict>
				<key>PayloadDescription</key>
				<string>Configures device to use NullPrivate</string>
				<key>PayloadDisplayName</key>
				<string>public.adguardprivate.com DoT</string>
				<key>PayloadIdentifier</key>
				<string>com.apple.dnsSettings.managed.11b4d48d-8e9b-4e15-b7c1-45cb1c564c99</string>
				<key>PayloadType</key>
				<string>com.apple.dnsSettings.managed</string>
				<key>PayloadUUID</key>
				<string>e9819f0c-250e-49b7-ad89-c0db078c72f0</string>
				<key>PayloadVersion</key>
				<integer>1</integer>
			</dict>
		</array>
		<key>PayloadDescription</key>
		<string>Adds NullPrivate to macOS Big Sur and iOS 14 or newer systems</string>
		<key>PayloadDisplayName</key>
		<string>public.adguardprivate.com DoT</string>
		<key>PayloadIdentifier</key>
		<string>e0b7d7db-e0d1-4bce-bcf4-8ada45d2f5a3</string>
		<key>PayloadRemovalDisallowed</key>
		<false/>
		<key>PayloadType</key>
		<string>Configuration</string>
		<key>PayloadUUID</key>
		<string>0404cb98-3621-4f97-9530-b18288633d40</string>
		<key>PayloadVersion</key>
		<integer>1</integer>
	</dict>
</plist>