From zdnet.com
![dns-hijacking-chrome-root-servers.png](https://zdnet4.cbsistatic.com/hub/i/2020/08/24/1c874927-aa4b-4233-9c7c-cd602f435cef/dns-hijacking-chrome-root-servers.png)
In an effort to detect whether a network will hijack DNS queries, Google’s Chrome browser and its Chromium-based brethren randomly conjures up three domain names between 7 and 15 characters to test, and if the response of two domains returns the same IP, the browser believes the network is capturing and redirecting nonexistent domain requests.