It translates ams15s22-in-x0e.1e100.net to Google and it does so openly without encryption in most cases,
So no matter how safe your Internet traffic is your provider can easily read, store and share your Internet history with anyone.
Now most Internet providers say that they do not do that and in any case they are exceptionally trustworthy....
So I have used DNScrypt for some time to prevent those trustworthy guys from reading my every internet surfing.
You will remember that lots of Facebook data landed in Cambridge - and the DNS would have been a great help there.
The problem is that some of the providers say that they do not store anything but we have no way of knowing if that is the case.
In comes Cloudflare with a new set of DNS that secures that you can use their name-servers and that nothing will be stored and logged.
Cloudflare has a history of promoting privacy but in principle this does not set them off from all the other providers that claim not to store anything.
But they have gone a step further and have engaged the Auditor KPMG to control and supervise that this is actually the case - that is as secure as it gets
Frankly, we don’t want to know what you do on the Internet—it’s none of our business—and we’ve taken the technical steps to ensure we can’t.
So drop Googles 220.127.116.11 and 18.104.22.168 and replace them with 22.214.171.124 and 126.96.36.199
In Linux you can enter the namservers directly in /etc/resolv.conf or enter the namservers in the Networkmanager,
This is easier than implementing Dnscrypt - a project that is experiencing some problems these days...