Does stop Session Hijacking on a network?

Hi all,

Does anyone know if using stops session hijacking occurring over a WiFi network?

I’m assuming one of our home’s IoT devices is compromised and I’m wondering if at every computer / phone endpoint would potentially solve this problem.


I would assume no, since all you’re doing is changing which DNS server is used. But I would still recommend to use to block malware on these devices, as this might break the malware if it doesn’t hardcode the IP address of its command & control server.


To expand on @Judge 's solution:
Malware, Phishing
Malware, Phishing,
Adult content 

Thanks Judge -

to clarify, even if the endpoint is using DNS over HTTPS, or DNS over WARP, the traffic still be intercepted / session hijacked from another device on the home network?


How is the device hijacking or intercepting the session?

Unsure but it’s happening only over home wifi network.

Example 1: In web meeting, tab reloads out of nowhere, “I’m” still listed as a user in the meeting, and I click to log back in and now there are two of “me” in the room. When the attacker realized we noticed it, they dropped.

Example 2: I have HTTPS Everywhere installed and multiple sites that have HTTPS attempt to downgrade to HTTP, and after I accept the downgrade and click disable / proceed, the connection to the site is HTTPS.


Update: Just noticed that the DNS on the VPN profile, that was installed from the app for Android/Chrome OS, stated this as the DNS!!

I just updated the DNS to this in the profile

I’m assuming I wasn’t actually connected to before, but now am.

Here are my debug results after the DNS update. is the local server for the app. Whereas for standard the local server is It’s not something that is irregular in any way from a security standpoint. {"isCf":"Yes","isDot":"No","isDoh":"Yes","resolverIp-":"Yes","resolverIp-":"Yes","resolverIp-2606:4700:4700::1111":"No","resolverIp-2606:4700:4700::1001":"No","datacenterLocation":"---","isWarp":"No","ispName":"Cloudflare","ispAsn":"13335"}

If you look at the above, which is the plaintext of the Base64 encoding used for the help logs you were asked to post, minus the location which I redacted. (Maybe CF would consider using something other than Base64 to encode the JSON, since location info (albeit the nearest data center to you not your actual location) is technically PII.)) Anyway, what you submitted says DoH was in use with IPv4, though not the “family protection” DNS.