As we all know, companies and governments track user's activities
online. One strategy for doing so is via dns, an unencrypted protocol
by default - allowing anyone to eavesdrop.

Two strategies for reducing the number of eavesdroppers is using
encrypted dns and avoiding corporate manageded dns providers (google,
cloudflare, your isp, etc). (NP these corporations run most of the
internet are nigh impossible to avoid - pick your battles).

One tool that makes this remarkably easy, as I just discovered, is
using unwind on openbsd - a part of base as of 6.5. what makes this
tool particularly easy is that it is designed to run on localhost,
and on mobile platforms like laptops with varying networks. It
automatically detects when it is running behind a "captive portal"
so you can login to random wifi networks without changing your setup
manually, and then switches back to preferred name servers.

It also defaults to using dns over tls, which is nice.

An alternative I've discovered is that tor is often not blocked on
most networks so dns resolution can be provided over the onion
network.  It is then impossible to correlate which dns queries
originate from which client.

Perhaps it is possible to marry unwind over tor, we shall see.