I have another method for keeping safe using DNS... don't use it. Assume the NSA is keeping a copy of all internet traffic by strong-arming those companies who control the Internet backbone. Or suppose at your ISP some entity is watching all of your traffic. Now Tor will hide your IP from web sites you visit, and HTTPS will encrypt all web traffic, but even if you use a DNS server that doesn't keep logs, the query and response can still be intercepted by your ISP, so I have come up with another method, actually 2 methods.
First, open up your Tor Browser Bundle folder and start Tor. Next use Startpage search (always use this) to find a HTTPS web site that allows you to do a network ping
from that web page. I will give you one if you are stuck. Anyway, at that point ping the name of the web server, i.e.
www.thcfarmer.com The response will include the IP address of the server. From time to time, administrators change which IP address is resolved by a domain name, which is one reason we use DNS.
Now, take the IP address and simply put it in your web browser title bar, include the https, e.g.
Your browser should freak about the site certificate not matching (because you are using an IP address instead of the name), view the details of who the certificate is issued to, and put your mind at ease. Check the fingerprint if you want.
Now you are getting here without using DNS. OR you can add an entry to your hosts file. Your system will resolve using the hosts file first, before DNS, that's what it is for. If you are using a Linux Live system, the hosts file won't be saved at reboot though.
peace!
Califlower