In reference to this question, last updated five years ago.
I'm interested in setting up a public DNS server as a personal project, but I'm aware that open resolvers make it extremely easy to amplify requests and DDoS other resolvers. I sought advice from StackExchange and found the above answer.
The original question asks how to set up an open DNS resolver securely, a-la Google DNS, and the original reply explains why it is infeasible for people without a lot of money and a legal team, and encourages the OP (if they still wished to continue) to ask more questions on the topic.
The above question is listed as a Canonical Question, and has a total of two replies, with the latest update in 2015.
But it's 2020 now, and things appear to have changed. We have PiHole now, and so many people have their own (private, closed) DNS resolver. We have Cloudflare DNS and NextDNS and other open professional DNS resolvers, but we also have various public PiHole DNS resolvers. DNS over TLS and DNS over HTTPS are becoming commonplace as well, which (I assume) should be able to prevent the spoofing necessary for amplification attacks.
So, my questions: Should the answer to the above question be changed? Is it now plausible for one to securely set up an open DNS resolver? Or is it still a foolish idea for a personal project?