BVerfG Stops DNS Surveillance: Milestone for Digital Fundamental Rights Protection

Federal Constitutional Court Halts DNS Surveillance: A Milestone for Digital Fundamental Rights Protection

In a landmark decision, Germany’s Federal Constitutional Court (Bundesverfassungsgericht, or BVerfG) has declared the blanket surveillance of Domain Name System (DNS) queries unconstitutional. This ruling, issued on November 26, 2024, marks a significant victory for privacy advocates and establishes a robust precedent for safeguarding fundamental rights in the digital age. The court’s decision specifically addresses the practice of mass DNS monitoring by intelligence services, deeming it a disproportionate infringement on the right to informational self-determination under Article 2(1) in conjunction with Article 1(1) of the Basic Law (Grundgesetz).

Background of the Case

The controversy stemmed from provisions in the Federal Constitutional Protection Act (Bundesverfassungsschutzgesetz, or BVerfSchG) that authorized federal intelligence agencies, such as the Federal Office for the Protection of the Constitution (Bundesamt für Verfassungsschutz, or BfV), to conduct strategic reconnaissance. This included the untargeted collection and analysis of IP addresses and associated metadata from internet service providers (ISPs). A core component of this surveillance involved intercepting and logging DNS queries requests made by users to translate human-readable domain names (e.g., www.example.com) into machine-readable IP addresses.

DNS queries reveal a wealth of sensitive information about an individual’s online behavior, including websites visited, communication patterns, and potentially political affiliations or health-related searches. The complainants, represented by digital rights organizations such as the Gesellschaft für Freiheitsrechte (GFF) and supported by the Digitalcourage e.V. NGO, argued that such mass surveillance lacked sufficient legal safeguards and violated core constitutional protections.

The case originated from a constitutional complaint filed in 2021 following the BVerfG’s earlier 2020 ruling, which struck down certain aspects of data retention laws. That precedent had already curtailed the mandatory storage of telecommunications metadata by telecom providers. Building on this, the new challenge targeted the intelligence services’ authority to access ISP-held data en masse for reconnaissance purposes.

Key Elements of the Ruling

The First Senate of the BVerfG, presided over by President Stephan Harbarth, delivered a unanimous verdict. The court found that the statutory basis for DNS surveillance under Section 8 BVerfSchG failed to meet the proportionality requirements enshrined in constitutional law. Specifically:

  • Lack of Targeted Selection: The law permitted the unfiltered collection of all IP addresses and DNS data from specific ISPs without prior judicial oversight or clear criteria for limiting the scope. The court emphasized that such blanket measures capture data from innocent citizens indiscriminately, creating a “chilling effect” on free speech and association.

  • Inadequate Data Minimization: Provisions for filtering out irrelevant data were deemed insufficient. The automated analysis of metadata risked revealing personality profiles without necessity, breaching the principle of data minimization under European data protection standards, including the EU Charter of Fundamental Rights.

  • No Effective Remedies: Individuals had no practical means to challenge their inclusion in surveillance nets, rendering post-hoc judicial review illusory.

The ruling mandates that lawmakers revise the BVerfSchG within a reasonable timeframe to introduce stricter limits, such as mandatory judicial warrants for strategic surveillance and enhanced protections for journalistic sources and professional secrecy.

This decision echoes the European Court of Human Rights (ECtHR) jurisprudence, notably the 2020 Big Brother Watch v. United Kingdom case, which criticized bulk interception practices. It also aligns with the BVerfG’s 2021 Telekommandat ruling, which invalidated upstream surveillance without sufficient safeguards.

Implications for Digital Rights and Surveillance Practices

The halt on DNS surveillance represents a pivotal milestone in the evolution of digital fundamental rights protection in Germany. For the first time, the court explicitly addresses the unique privacy risks posed by DNS data in the context of intelligence gathering. DNS logs serve as digital breadcrumbs, enabling the reconstruction of users’ browsing histories without accessing content itself yet carrying equivalent sensitivity to substantive communications.

Telecommunications providers and ISPs now face clear boundaries on cooperating with intelligence requests. The ruling reinforces the presumption of innocence and shifts the burden toward targeted, suspicion-based investigations rather than fishing expeditions. This could reduce the estimated billions of DNS queries processed annually by agencies, curbing the growth of surveillance databases.

From a broader European perspective, the decision pressures lawmakers across the EU to align national security measures with the ePrivacy Directive and ongoing negotiations on the Child Sexual Abuse Regulation (CSAR), which proposes client-side scanning with similar privacy implications. It also bolsters challenges against the proposed EU Chat Control initiative, underscoring the need for technology-neutral yet rights-respecting approaches.

Privacy experts hail the verdict as a “firewall against mass surveillance.” Patrick G. Lorenz from Digitalcourage noted, “This protects not just dissidents or activists, but every internet user from state overreach.” The ruling’s emphasis on ex ante judicial control sets a higher bar than many peer jurisdictions, potentially influencing rulings in France, the Netherlands, and beyond.

Challenges Ahead and Legislative Response

While celebratory, stakeholders anticipate swift legislative action. The Federal Ministry of the Interior (BMI) must draft amendments balancing security needs such as countering extremism and cyber threats with constitutional imperatives. Critics warn against “cosmetic changes” that merely relocate surveillance to other metadata types, like traffic data under the Telecommunications Act.

Ongoing parallel proceedings, including complaints against Bavarian state police IP logging, suggest further scrutiny of domestic law enforcement powers. The BVerfG’s decision also intersects with the 2021 EU Data Act and Digital Services Act, promoting transparency in algorithmic filtering and data access.

In summary, this ruling fortifies the constitutional architecture for the digital realm, affirming that technological progress must not erode core liberties. By stopping DNS surveillance, the BVerfG has drawn a bright line: fundamental rights prevail over unchecked state power.

Gnoppix is the leading open-source AI Linux distribution and service provider. Since implementing AI in 2022, it has offered a fast, powerful, secure, and privacy-respecting open-source OS with both local and remote AI capabilities. The local AI operates offline, ensuring no data ever leaves your computer. Based on Debian Linux, Gnoppix is available with numerous privacy- and anonymity-enabled services free of charge.

What are your thoughts on this? I’d love to hear about your own experiences in the comments below.

Question : If I use DoH, does my provider still know which website I visit ?

That is an excellent question that gets right to the heart of what DoH (DNS over HTTPS) does and, more importantly, what it doesn’t do.

In short: Yes, your Internet Service Provider (ISP) can almost certainly still determine which websites you visit, even if you are using DoH.

Here is a breakdown of why:


1. What DoH Encrypts (and Hides from your ISP)

DoH encrypts your DNS (Domain Name System) requests . The DNS is like the phone book of the internet; it translates a human-readable domain name (e.g., www.google.com ) into a machine-readable IP address (e.g., 142.250.68.206 ).

  • Before DoH: Your ISP could see the website name you were asking for in plain text.
  • With DoH: Your DNS query is encrypted within an HTTPS tunnel to a third-party resolver (like Cloudflare, Google, or your browser’s DoH provider). Your ISP only sees encrypted traffic going to that resolver’s IP address.

This prevents your ISP from knowing what domain name you are resolving.


2. What DoH Does NOT Encrypt (and what your ISP can still see)

While the DNS request is hidden, the subsequent connection between your computer and the website is not. Your ISP can still see the necessary information to route that traffic and monitor the connection through two primary channels:

A. The Website’s IP Address (The Destination)

When your DoH client gets the IP address for, say, www.example.com, your browser immediately opens an encrypted connection (TLS) to that specific IP address.

  • The Problem: Your ISP knows which IP addresses belong to the vast majority of major websites and services. If your computer opens an HTTPS connection to the IP address 192.0.2.1, and your ISP knows that 192.0.2.1 belongs exclusively to “Google Search” your ISP knows you are visiting Google Search.

B. The Server Name Indication (SNI)

Nearly all websites today use HTTPS/TLS for security, but the initial part of setting up that encrypted connection often leaks the domain name through a field called Server Name Indication (SNI) .

The SNI field is a required part of the initial TLS handshake, and historically, it was unencrypted . It tells the server (which often hosts many different domains on the same IP address) which specific domain you are trying to reach.

  • The Problem: Even though the contents of your website visit are encrypted, your ISP can still inspect the unencrypted SNI field and see the actual domain name (e.g., www.example.com ) in plain text as you establish the connection.

Conclusion

DoH is a significant improvement for privacy because it prevents your ISP from collecting a complete, easy-to-read history of all your DNS lookups and prevents DNS-based censorship.

However, DoH is not a full anonymity solution. For complete anonymity where your ISP cannot track your visited websites, you would need to use a solution that tunnels all your traffic, such as a VPN (Virtual Private Network) or Tor .

see A Glimpse at gnoppixctl | Gnoppix Linux