"The slide also shows that AT&T retains “cloud storage internet/web browsing” data for 1 year. When asked what this detail entails exactly, such as websites visited by customers on the AT&T network, AT&T spokesperson Margaret Boles said in an email that “Like all companies, we are required by law to comply with mandatory legal demands, such as warrants based on probable cause. Our responses comply with the law.” The document also mentions that law enforcement can request records related to wearable devices from AT&T."
do you know what this “cloud storage internet/web browsing” data looks like?
Do you assume that the FBI does not have a similar document for Cloudflare (or any VPN or DoH provider)? I think it's probably healthy to assume that your accessed host history is semi-public regardless of how well you try to protect it. Note that even with esni your ISP or your VPN's ISP will still know the IP addresses you're getting to, and in most ordinary cases can do a reverse lookup.
CF doesn't retain much if any data from 1.1.1.1 so at a minimum you are protected from retrospective surveillance. I agree it's impossible to be perfect but let that not be the enemy of good.
>Is there any way to change dns servers on lte/3G?
probably doesn't matter because regular dns is performed in the clear. There's nothing preventing them from logging/intercepting your requests even if you changed them.
>Odd that iPhones let you change it for wifi, but not cellular.
>What about android?
AFAIK on both changing DNS can be done by using an app that acts like a VPN, and intercepts the DNS requests.
The legal aspect might change what AT&T 'has' to log, although they likely voluntarily include other passively-obtained port 53 traffic in their cooperation.
iOS works with opendns think of it like a cloud pi-hole—I was using the app which used to have issues with cellular, but has worked as expected more recently. Use the generated profile…
do you know what this “cloud storage internet/web browsing” data looks like?