Yes. DNS queries together with their originating client IP address are stored for 24 hours to protect against DNS amplification attacks. This is an automated process performed by fail2ban and requires no human interaction. I.e. I will NOT be sniffing through the logs.

DNS queries are stored in the pihole.log and FTLDNS database. After 24 hours, logged DNS queries are deleted from disk and are not included in any backups.

Rest assured that I will never sell or share your data with any third party. I have no desire to impose on you and zero interest in trying to do anything with your private details.

All Public Piholes use their own, local, recursive DNS server, powered by unbound. The reason for that is simple:

Pi-hole includes a caching and forwarding DNS server, now known as FTLDNS. After applying the blocking lists, it forwards requests made by the clients to configured upstream DNS server(s). However, as has been mentioned by several users in the past, this leads to some privacy concerns as it ultimately raises the question: Whom can you trust? Recently, more and more small (and not so small) DNS upstream providers have appeared on the market, advertising free and private DNS service, but how can you know that they keep their promises? Right, you can't.

Furthermore, from the point of an attacker, the DNS servers of larger providers are very worthwhile targets, as they only need to poison one DNS server, but millions of users might be affected. Instead of your bank's actual IP address, you could be sent to a phishing site hosted on some island. This scenario has already happened and it isn't unlikely to happen again...

When you operate your own (tiny) recursive DNS server, then the likeliness of getting affected by such an attack is greatly reduced.

Source: https://docs.pi-hole.net/guides/unbound/

All Public Piholes use the über blocklist by dbl.oisd.nl.
More information about this massive blocklist can be found here.

Yes, all Pi-holes pass the DNS Nameserver Spoofability Test by GRC, which checks for Cache Poisoning.

https://public-pihole.com/wp-content/uploads/2019/06/firefox_2019-06-20_12-01-48.png

After configuring your device to use my DNS servers, go to dnsleaktest.com and run a standard (or extended) test.
ONLY *.public-pihole.com should show up as hostname(s) the results table, like shown below.

See the details on the DNS Servers page. Alle Pi-holes are placed on fast uplinks in professional data centers operated by Scaleway and OVH.

My provider, Scaleway, only has French IPs, but are routed through The Netherlands if assigned to a Dutch Virtual Private Server (VPS).
However, I can assure you, the VPS is physically located in The Netherlands (Amsterdam).

My name is Freek. I operate this DNS service as an individual with my own money. If you have questions or comments, please see the contact page.

No. This service is provided based on best effort.
Additionally, it's provided without any warranty and I renounce liability for any claim, damages or other liability arising from the use of this service.

The Netherlands and France each have 2 vCPUs, 2GB RAM and a local SSD.
Canada and Singapore each have 1 vCPU, 2GB RAM and a local SSD.
All instances run Ubuntu Server 18.04 LTS.

The installation of each instance was done in an automated way using Ansible, to save time and reduce human error. The Ansible playbook was written by myself and is open-source. It can be found at my Github account.