@vaporeon_ unencrypted DNS requests are a potential MITM attack. you could modify a request and the client to hit your own server instead, HSTS preload notwithstanding
@vaporeon_ HSTS purreload is a way to register a domain as known-HSTS with an authority that the major browsers download a massive list of known-HSTS domains from (at build time? or maybe even directly into the source code?) and ship with. the idea is to purrevent a MITM attack during the furst (otherwise necessarily unencrypted) visit to the website from being pawsible