March 27, 2026
DNS = Doomsday Name Service
Can It Resolve Doom? Game Engine in 2k DNS Records
From internet phonebook to game console—cool hack or malware maker? Comments erupt
TLDR: A researcher ran the game DOOM entirely from DNS text records, proving the internet’s “phonebook” can deliver full programs. Commenters are wowed by the stunt but split between praising the clever hack, fretting about malware implications, and griping about AI-summarized, duplicate posts—cool demo, hot debate.
The internet’s phonebook just booted up a 90s classic, and the crowd is split between clapping and clutching pearls. A security tinkerer stuffed the entire game DOOM into about 2,000 DNS “TXT” records—think tiny text notes meant for email settings—and proved you can fetch, reassemble, and run it from memory. It’s equal parts nerd flex and IT horror story. Fans are cheering, “If it can run DOOM, it’s a computer,” while defenders warn this is a blueprint for sneaky malware delivery. One wag even dubbed it the “free worldwide storage plan your boss told you not to try.”
But the biggest fireworks aren’t technical—they’re meta. Commenters pounced on the write-up’s lineage: was this an AI-flavored summary slapped atop the original blog post and a repo that made the rounds already? One commenter dryly linked yesterday’s thread with “Yesterday (88 comments)” and another sighed, “This is confusing. Is it just an AI summary pasted on top…” with a side-eye to duplication and content recycling. Meanwhile, sysadmins joked about blocking TXT records and breaking email, blue-teamers begged people to stop giving attackers ideas, and meme-lords renamed DNS to Do Not Scan and Doomsday Name Service. Somewhere between “genius hack” and “security nightmare,” the vibe is classic internet: marvel at the trick, then argue over who posted it first—and whether we should be laughing or logging everything on port 53.
Key Points
- •The article demonstrates storing and executing DOOM entirely via DNS by using TXT records as a file store.
- •Binary files are Base64-encoded, chunked, and distributed across roughly 2,000 DNS TXT records in a zone.
- •A modified C# port (managed-doom) and .NET assemblies are loaded from memory to avoid filesystem access.
- •A ~250-line PowerShell loader queries TXT records, reassembles data in memory, and launches the game.
- •The technique highlights DNS abuse potential for malware staging, covert payloads, and forensic evasion, with noted scalability limits.