this post was submitted on 06 Aug 2023
163 points (94.5% liked)

Privacy

29798 readers
786 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

Chat rooms

much thanks to @gary_host_laptop for the logo design :)

founded 4 years ago
MODERATORS
 
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 9 points 11 months ago* (last edited 11 months ago) (4 children)

Excuse me for my lack of understanding, but why are there so many people looking to hide their traffic from their ISP with a VPN? Isn't HTTPS enough? Are you afraid of ISPs resorting to DPI or MiM to spy on their users? Is customer protection so weak in the US that ISPs are free to spy on their customers using aforementioned techniques?

Edit: I just realized that I left out people leaving under authoritarian regimes, for whom VPNs are unfortunately required to evade their government.

[–] [email protected] 15 points 11 months ago (1 children)

Is customer protection so weak in the US that ISPs are free to spy on their customers using aforementioned techniques?

ISPs not only sell cell location data to bounty hunters/anyone who can fork over money, they also sell ad targeting information about their customer. They have also injected Javascript into pages (selling new modems) and add(ed) unique headers to HTTP traffic so websites could identify individual users despite their best attempts.

Not all of them do all of this crap, but this shit is one of the reasons Mozilla enabled DoH in the USA by default. It also helped the push for getting HTTPS everywhere.

[–] [email protected] 4 points 11 months ago

They have also injected Javascript into pages (selling new modems) and add(ed) unique headers to HTTP traffic so websites could identify individual users despite their best attempts.

This must have been pre-HTTPS since you'd need to MitM the SSL certificate for that to work

[–] [email protected] 8 points 11 months ago (3 children)

Because HTTPS protects only things you do on the site. ISP still knows which sites you connect to. Which YouTube video you are watching to. etc. F.E. in Russia ISP's have to keep logs of users interactions for half of year and give it to government when they need them.

[–] [email protected] 8 points 11 months ago* (last edited 11 months ago) (1 children)

Your ISP won't know what video you're watching, only that you're accessing data from youtube.com and other domain names.

That's not a problem for most generic websites, but authoritarian governments probably won't like you visiting any domain that looks like wikileaks.com or voanews.com.

[–] [email protected] 5 points 11 months ago

My opinion. I can't trust any government on this planet anymore. So much fuck ups and stupid decisions. So basically every government is kinda authoritarian for me...

[–] [email protected] 5 points 11 months ago* (last edited 11 months ago) (2 children)

ISP still knows which sites you connect to.

Yes, because they know the IPs your packets go to, but if there are multiple websites behind a single IP they won't know which one (unless you use your ISP DNS server, which you should probably not)

Which YouTube video you are watching to. etc.

No, because the URL is contained within the HTTP packets which are encrypted with SSL (the S in HTTPS), so unless the ISP does MiM, they cannot know which URL you are visiting.

[–] [email protected] 6 points 11 months ago (1 children)

Yes, because they know the IPs your packets go to, but if there are multiple websites behind a single IP they won't know which one (unless you use your ISP DNS server, which you should probably not)

That's not true. Almost all TLS clients use SNI to send the server name in plaintext, so the server can present the right certificate. With QUIC/http3, this is no longer done in plaintext, but the packet is still being sent alongside the initial encryption key so anyone with access to the traffic can simply decrypt these packets.

There are trials out there for ESNI/ECH, which encrypts the SNI fields in a way the ISP can't read, but those are far from stable, not implemented by most web servers, not enabled by default by web browsers, and require additional setup for website admins (read: won't be widely implemented for another five to ten years).

The URL and Host header are encrypted of course. Your ISP can find out you're going to youtube.com, but not what video you're watching.

[–] [email protected] 5 points 11 months ago

Oh, thanks for this precision, I wasn't aware of this. And now that I think of it, it's obvious that the first exchange with a server has to be unencrypted

[–] [email protected] -1 points 11 months ago* (last edited 11 months ago)

Hmm... You have way better knowledge than I am. It seems so. Should think about this things some time later 😉

[–] [email protected] 7 points 11 months ago (1 children)

To me, the problem is you are instead giving over all of your info to the VPN company, and still be tracked by other means such as fingerprinting of devices, cookies/site data or browsing patterns. Is some random VPN company more trustworthy than my ISP and who’s to say they aren’t sharing the information? Plus, the could also be subpoenaed/NSLed if that’s the concern.

[–] [email protected] 11 points 11 months ago (1 children)

I'd be more willing to trust a VPN company with this data than an ISP. The former's entire business hinges on providing privacy to their customers while the latter can just sell your data to whoever they want and most people wouldn't bat an eye.

[–] [email protected] 1 points 10 months ago (1 children)

I'd have plenty of questions about the VPN company though. Some of these would be the same as ISPs, some worse for VPN companies.

  • do we know if they're compromised by our government or a foreign government?
  • Are their systems actually secure?
  • do they explicitly share data with a government, like they may be forced to?
  • do they sell data and just lie about it?
  • do they actually log data and lie about not logging or deleting it?
  • what if they do something like an exit scam where it turns out they did collect all your info, and then sell it before they close up shop?
[–] [email protected] 1 points 10 months ago

Legitimate questions, but why would it be worse for VPN companies?

The way I see it, I have no way of verifying the answers to any of these regardless of whether it's an ISP or a VPN, but I do know that VPNs have a greater incentive to provide you with proper privacy because if they were found to fail at this, the entire business dies. ISPs run no such risk, especially since many of them are effectively monopolies.

[–] [email protected] 6 points 11 months ago

Because my ISP stopped my internet access last time they were contacted by a copyright holder whose thing I torrented.