Browser-only

Brave Setup

Brave exposes Secure DNS in its security settings. It is a good choice if you want Handshake access inside Brave without changing your device-wide DNS path.

At a glance

Best for

Brave users who want a browser-only setup.

Protocol

DoH

Coverage

Browser-only

Setup time

1 minute

Main input

https://dns.easyhns.com/dns-query

Brave Setup stays focused on the shortest accurate path for this platform.

Guide summary

Brave users who want a browser-only setup.DoHBrowser-onlyEasy1 minute

Before you start

Check 01

Use a recent desktop Brave build.

Check 02

Check brave://settings/security if you want to jump straight to the right screen.

Exact Values

Use the right field for the right input.

URL fields need the full DoH URL. Hostname fields need the DoT hostname only. IP fields need the raw address only.

Custom provider URL

https://dns.easyhns.com/dns-query

Use this in Brave's Secure DNS field.

Step-by-Step

Short steps, no filler.

Follow the route in order, then verify the active DNS setting before changing another layer.

Step 01

Open Brave security settings

Open Brave, then go to Settings > Privacy and security > Security. You can also open brave://settings/security.

Step 02

Enable Secure DNS

Find Use secure DNS and turn it on.

Step 03

Choose the Easy HNS resolver

Use the custom provider option and paste https://dns.easyhns.com/dns-query.

How to verify

Check 01

Open a Handshake domain inside Brave after saving the provider.

Check 02

If Brave behaves as if nothing changed, restart the browser or open a fresh private window for a quick clean test.

Troubleshooting

Note 01

If the field resets, make sure you pasted the full URL including https:// and /dns-query.

Note 02

If Brave is on a managed profile, security settings may be locked.

Important note about Handshake website security warnings

Using Easy HNS gives you convenient access to Handshake domains, but standard browsers may still show security warnings for some Handshake websites.

Why? Because most mainstream browsers do not natively validate Handshake trust and DANE/TLSA in the same way they validate the conventional HTTPS web.

As a result:

  • some Handshake websites may load over HTTP;
  • some may show a browser warning or missing secure indicator;
  • this is often a browser trust-model limitation, not automatically proof that the website is malicious.

If you want a stronger Handshake-native browsing experience with DANE/TLSA support, use Fingertip for desktop.

Using a VPN?

Easy HNS still works well with VPNs, but browser Secure DNS can override router or system DNS, and some VPN apps force their own resolver. Use 51.24.7.1 only in IP fields, use https://dns.easyhns.com/dns-query only in DoH fields, and verify which layer is actually winning.