Browser-only

Opera Setup

Opera's wording and placement can move between versions, so the quickest route is often to search Settings for DNS over HTTPS. Once there, Easy HNS works as a custom provider.

At a glance

Best for

Opera users who want Handshake access without touching system DNS.

Protocol

DoH

Coverage

Browser-only

Setup time

1 minute

Main input

https://dns.easyhns.com/dns-query

Opera Setup stays focused on the shortest accurate path for this platform.

Guide summary

Opera users who want Handshake access without touching system DNS.DoHBrowser-onlyEasy1 minute

Before you start

Check 01

Use a current desktop Opera build.

Check 02

Be ready to search Settings for DNS over HTTPS if the menu labels differ slightly from these instructions.

Exact Values

Use the right field for the right input.

URL fields need the full DoH URL. Hostname fields need the DoT hostname only. IP fields need the raw address only.

Custom provider URL

https://dns.easyhns.com/dns-query

Paste this into Opera's custom DoH field.

Step-by-Step

Short steps, no filler.

Follow the route in order, then verify the active DNS setting before changing another layer.

Step 01

Search Settings for DNS over HTTPS

Open Opera Settings and search for DNS over HTTPS or secure DNS if you do not see the option immediately.

Step 02

Turn on browser DoH

Enable the DNS over HTTPS feature instead of using the default system DNS behavior.

Step 03

Save Easy HNS as the custom server

Choose the Custom option and paste https://dns.easyhns.com/dns-query.

How to verify

Check 01

Open a Handshake domain inside Opera after saving the custom URL.

Check 02

If Opera keeps older DNS results, restart it once.

Troubleshooting

Note 01

If the custom value disappears, update Opera and try entering the URL again from a fresh Settings screen.

Note 02

If you only see preset providers, use Chrome or Firefox instead or update to a newer Opera build.

Important note about Handshake website security warnings

Using Easy HNS gives you convenient access to Handshake domains, but standard browsers may still show security warnings for some Handshake websites.

Why? Because most mainstream browsers do not natively validate Handshake trust and DANE/TLSA in the same way they validate the conventional HTTPS web.

As a result:

  • some Handshake websites may load over HTTP;
  • some may show a browser warning or missing secure indicator;
  • this is often a browser trust-model limitation, not automatically proof that the website is malicious.

If you want a stronger Handshake-native browsing experience with DANE/TLSA support, use Fingertip for desktop.

Using a VPN?

Easy HNS still works well with VPNs, but browser Secure DNS can override router or system DNS, and some VPN apps force their own resolver. Use 51.24.7.1 only in IP fields, use https://dns.easyhns.com/dns-query only in DoH fields, and verify which layer is actually winning.