Brave Setup
Brave exposes Secure DNS in its security settings. It is a good choice if you want Handshake access inside Brave without changing your device-wide DNS path.
At a glance
Best for
Brave users who want a browser-only setup.
Protocol
DoH
Coverage
Browser-only
Setup time
1 minute
Main input
https://dns.easyhns.com/dns-query
Brave Setup stays focused on the shortest accurate path for this platform.
Guide summary
Before you start
Check 01
Use a recent desktop Brave build.
Check 02
Check brave://settings/security if you want to jump straight to the right screen.
Use the right field for the right input.
URL fields need the full DoH URL. Hostname fields need the DoT hostname only. IP fields need the raw address only.
Custom provider URL
https://dns.easyhns.com/dns-query
Use this in Brave's Secure DNS field.
Short steps, no filler.
Follow the route in order, then verify the active DNS setting before changing another layer.
Step 01
Open Brave security settings
Open Brave, then go to Settings > Privacy and security > Security. You can also open brave://settings/security.
Step 02
Enable Secure DNS
Find Use secure DNS and turn it on.
Step 03
Choose the Easy HNS resolver
Use the custom provider option and paste https://dns.easyhns.com/dns-query.
How to verify
Open a Handshake domain inside Brave after saving the provider.
If Brave behaves as if nothing changed, restart the browser or open a fresh private window for a quick clean test.
Troubleshooting
If the field resets, make sure you pasted the full URL including https:// and /dns-query.
If Brave is on a managed profile, security settings may be locked.
Important note about Handshake website security warnings
Using Easy HNS gives you convenient access to Handshake domains, but standard browsers may still show security warnings for some Handshake websites.
Why? Because most mainstream browsers do not natively validate Handshake trust and DANE/TLSA in the same way they validate the conventional HTTPS web.
As a result:
- some Handshake websites may load over HTTP;
- some may show a browser warning or missing secure indicator;
- this is often a browser trust-model limitation, not automatically proof that the website is malicious.
If you want a stronger Handshake-native browsing experience with DANE/TLSA support, use Fingertip for desktop.
Using a VPN?
Easy HNS still works well with VPNs, but browser Secure DNS can override router or system DNS, and some VPN apps force their own resolver. Use 51.24.7.1 only in IP fields, use https://dns.easyhns.com/dns-query only in DoH fields, and verify which layer is actually winning.
Setup guide
Chrome
Use Chrome Secure DNS and point it at the Easy HNS DoH URL.
Protocol
DoH
Scope
Browser-only
Time
1 minute
Setup guide
Edge
Turn on Secure DNS in Edge and use the Easy HNS resolver template.
Protocol
DoH
Scope
Browser-only
Time
1 minute
Setup guide
Opera
Opera supports DNS over HTTPS, including a custom resolver field in current desktop builds.
Protocol
DoH
Scope
Browser-only
Time
1 minute