What can your ISP see?
What can your ISP see?
Other urls found in this thread:
domain.com
domain.com
domain.com
simplednscrypt.org
twitter.com
The ISP can see every packet that passes through their computers. Hope I helped.
What about HTTPS?
they can see it, where it's going, where it came from, just not read the contents.
They still see the destination address and when it was sent, and they can deduct tons of information from these: potential age, gender, marital status, your daily routine, etc.
For example, this is the whole thing you're accessing:
GET domain.com
referer: domain.com
cookies: faggot=true
This is what your ISP sees:
- SSL handshake between you and domain.com
- a bunch of encrypted packages being exchanged between you and domain.com
They still know that you accessed domain.com, when you accessed and for how long. They can also have some idea of the size of what was transferred.
This basically. Or use a vpn
Check out
dns over tls
esni
IP address
>They still know that you accessed domain.com
they see only IP, not host. there might be multiple hosts on same IP
>cookies: faggot=true
i lol'd
>they see only IP, not host. there might be multiple hosts on same IP
This is exactly what shared hosting is, but there is still a get request to a URL, and a DNS translation to an IP if you're not running your own DNS server.
Every time I called my ISP for some problem I was paranoid the random tech support employee would be able to see my porn habits or torrents as we were speaking on the phone.
So I asked some friends who worked for an ISP and they said "don't be ridiculous, they don't care".
They didn't say "they can't" or "it's illegal" or "it's not allowed". They said "they don't care". That means they can, and they do.
They can see you went to pornhub.com but they can't know which videos you watched. But if you go to a fetish specific site (e.g. blacked.com) they'll know exactly what kind of porn you're into.
Unironically play watchdogs for a couple hours. You'll know that they don't care.
>your ISP
what about cloud flare?
I just use DNS over TLS to avoid all this.
really its not people snooping on you that I'd be concerned about. I'd be concerned about automated systems being fed that kind of information. Think China's social-credit botnet.
They can see everything including encrypted traffic
The GET itself is encrypted if you're using HTTPS. If you go on Jow Forums, for instance, your ISP/government/nation-state level enemy can only tell that you're talking to some Cloudflare server.
That said:
>there are website fingerprinting techniques that can let them know you're browsing Jow Forums
>based on things like thumbnail sizes, they can probably also tell which threads you're looking at
>they can probably tell which posts are yours by looking at timestamps and image sizes
So what does your ISP see when using DNS over TLS?
So instead of the ISP, it's the VPN provider that knows everything you do
They'll see that you are accessing the internet and how much data you are transferring.
wrong, they see certificate is issued to Jow Forums, they see your DNS query, they see the certificate for Jow Forums, they know u are talking with Jow Forums server.
unless u turn encrypted SNI or use a VPN, or both, then they cant see the content of packets
the people who work there download torrent too, i think that you can lawsuit the the ISP for that, maybe?
they can see the domainname in clear text, but not what is after domainname.com/[here]
You really think some tech support intern pulls up your entire browsing history on his screen?
I'm good, e621 sounds innocent enough.
until they look it up
The unencrypted extensions including the "server name indicator" (domain name), and the size and duration of each request and response. The latter is important, as it can be used to fingerprint what you viewed/did on said domain.
>http
All plaintext strings, ip/messages
>https
Plaintext IP, messages "encrypted"
wtf just realised i've been on Jow Forums on http for months... my isp knows everything.
surely they can do SSL inspection though right? Its on every single NGFW out there...
Generic techs dont see it from phone. if they're in your house accessing your router/computer, then they might be able to see you go to pornhub.com or your browser history.
Your frivolous use of the n word will be included in the future social credit score.
They're still going to see your DNS query, even if you use an external DNS server.
>They can also have some idea of the size of what was transferred.
If they do any profiling of a specific site (like say because the fed put them up to it) then they probably have a good idea what you downloaded based on the size alone.
FYI the postman and courier companies also know exactly what you order. They also don't care.
They'll see that you're establishing a TLS handshake with the DNS server. And then later you're establishing a TLS handshake with some IP, which is the website the DNS resolved for you.
They'll then have: the time of your requests, the address of the DNS server you're using, the address of whatever you resolved.
>they can deduct tons of information from these: potential age, gender, marital status, your daily routine, etc.
If you think they actually have the means to do that, you need to take your meds. Otherwise you'll have to explain why so many terrorist don't get caught that way.
My fat greasy cock
Good point, but Cloudflare does support encrypted SNI and as far as I can tell Jow Forums uses it.
>They also don't care.
proof?
I work for one and there isn't much novelty left after seeing your thousandth package of weed from canada or "adult toys" from china.
>on phone with tech support
>ask me to run speedtest
>wake up computer and realize I left 10 tabs of porn up
>tech support laughs for no reason and says let me know what the results are
only if you'd be retarded enough to trust your isp as a certificate authority
Cloudflare is an NSA honeypot started due to prism snowden leaks its even same named related to light/sun
>They said "they don't care". That means they can, and they do.
jumping to conclusions: the post
They'll still see the domain because of SNI.
>And then later you're establishing a TLS handshake with some IP, which is the website the DNS resolved for you
>which is the website the DNS resolved for you
wrong
What about SFTP?
same
Except SSH doesn't use TLS
ISPs don't care about or target terrorists at all, they can't sell their browsing habits to marketing firms, they are not really monetizable. That's why most ISPs don't notice and report them to the authorities.
but what if someone suddenly cares?
>access a site via https
>not even god can see what I'm doing
does setting network.security.esni.enabled in firefox work for encrypting sni? why isn't it mentioned in PrivacyTools?
Because you need to use Cloudflare DNS for it to work, although granted pretty much all large websites use Cloudflare nowadays you might as well use their DNS since they know what websites you visit anyway.
>They're still going to see your DNS query, even if you use an external DNS server
dnscrypt
not only that, but now you're be paying for 2 services, ISP + VPN, probably run by the same (((guy))) at the top
i use dns from OpenNIC, would cloudfare be better?
Have fun using cloudflare with that. It's only like half the internet at this point.
Really makes a compelling argument for sploiting up your own botnet to relay through.