DNS over HTTPS (doh) is useful for protecting DNS query information
from wire tapping on the route. However, DoH providers need query
information for name resolution and client IP addresses for
communication. Then, DoH providers know all the users' privacy
information as in the case of traditional DNS. To protect clients'
privacy, this presentation proposes to hide query source IP addresses
from DoH providers by using Carrier Grade NAT (CGN), open NAT64, IPv6
transition technology and open HTTP(S) proxies.