this post was submitted on 06 Aug 2023
162 points (94.0% liked)
Privacy
31872 readers
339 users here now
A place to discuss privacy and freedom in the digital world.
Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.
In this community everyone is welcome to post links and discuss topics related to privacy.
Some Rules
- Posting a link to a website containing tracking isn't great, if contents of the website are behind a paywall maybe copy them into the post
- Don't promote proprietary software
- Try to keep things on topic
- If you have a question, please try searching for previous discussions, maybe it has already been answered
- Reposts are fine, but should have at least a couple of weeks in between so that the post can reach a new audience
- Be nice :)
Related communities
Chat rooms
-
[Matrix/Element]Dead
much thanks to @gary_host_laptop for the logo design :)
founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
I don't. Your ISP can hardly see anything you do online. Almost all websites are encrypted with HTTPS and if you are concerned about them seeing what domains you visit you can just change your dns server to quad9 or something else privacy respecting. A more valid usecase for VPN is preventing websites from tracking you IP address, downloading "Linux ISO's" or bypassing geographical blocks and for that I used mullvad but I am looking for something else now that they blocked port forwarding.
İ dont know if you are serious but https dors not mean anything, all major https websites are already decrypted anyways
Yeah... that's not how TLS works.
I wont go into much detail but ISPs can act as intermediaries in https calls and TLS would work only between you and the ISP and then ISP and the requested server. Software like Zscaler does similar stuff you can look it up if you want
I'm familiar. Other than key exchange for encrypted connections, the whole point of HTTPS/TLS is establishing who you're connecting with is who they say they are and preventing man in the middle attacks just like you described.
If your traffic was being intercepted by something like Zscaler it wouldn't be able to provide the proper signed certificate of that web address and your browser would throw a mismatch error. IT departments using such intermediaries for https traffic inspection only get around this by installing the intermediaries' root CA on your system so it's not flagged by your browser or whatever you're using for TLS traffic.
The only way someone could intercept your TLS traffic and then pass it onto you without you knowing is by having that website's private key to sign the traffic with, which is a major security breach. As soon as something like that is discovered the certificate is revoked and a new one is issued with a different private key.
So, again, that's just not how TLS works.
https://en.m.wikipedia.org/wiki/Public_key_infrastructure