this post was submitted on 23 Apr 2024
1054 points (97.1% liked)

Memes

45730 readers
1152 users here now

Rules:

  1. Be civil and nice.
  2. Try not to excessively repost, as a rule of thumb, wait at least 2 months to do it if you have to.

founded 5 years ago
MODERATORS
 
you are viewing a single comment's thread
view the rest of the comments
[–] cyberpunk007@lemmy.ca 27 points 7 months ago (2 children)

At a minimum this meme maker has no idea how TLS, browsers, cookies, or DNS work.

[–] SapphironZA@sh.itjust.works 4 points 7 months ago (3 children)

Um, if you use their DNS they do. Some ISPs force that in fact.

[–] TexMexBazooka@lemm.ee 7 points 7 months ago (1 children)

No, a lot will default to that, but they can’t force you to use any particular dns server. I mean they can, buts a fcc violation at that point I believe

[–] SapphironZA@sh.itjust.works 3 points 7 months ago (1 children)

It became legal when the Trump administration got rid of net neutrality legislation.

This is why it is so important to get it back, but the current administration is dragging their feet.

[–] TexMexBazooka@lemm.ee 2 points 7 months ago* (last edited 7 months ago) (1 children)

…no, it didn’t. ISPs can’t just block access to specific dns servers Willy nilly. They can slow down specific dns servers of their choice but there’s literally no incentive to do so. Your individual dns traffic isn’t that important I promise.

[–] SapphironZA@sh.itjust.works 1 points 7 months ago (1 children)

They do worse than block it, the redirect it to their own servers.

And the data is worth it at volume. They have hundreds of thousands of users, along with the region they are in, as well as data on what websites they visit.

Advertisers have and continue to pay for that data.

[–] TexMexBazooka@lemm.ee 1 points 7 months ago* (last edited 7 months ago)

They don’t have any reason to redirect it. They can see your dns queries either way,

[–] Username@feddit.de 1 points 7 months ago (1 children)

How can the ISP force their dns? They can't know where you got the destination ip from.

[–] cyberpunk007@lemmy.ca 3 points 7 months ago (2 children)

They could technically just drop and traffic over port 53 that is not destined to their own DNS servers. But that's china level shit. I've never seen an ISP control this in North America.

[–] SapphironZA@sh.itjust.works 4 points 7 months ago

They can also redirect that traffic to their own DNS servers, so you think you are using 3rd party DNS, when you are actually still using theirs. This became legal when the Trump administration got rid of net neutrality legislation.

OpenDNS has an article on how to test if your ISP is doing it. https://support.opendns.com/hc/en-us/articles/227988727-How-can-I-tell-if-my-ISP-Allows-Third-Party-DNS-Providers

[–] Aganim@lemmy.world 3 points 7 months ago (1 children)

That is where DNS over TLS and DNS over HTTPS come in. 🙂

[–] cyberpunk007@lemmy.ca 2 points 7 months ago

Yes of course.

[–] cyberpunk007@lemmy.ca 1 points 7 months ago (1 children)

Never had an ISP firewall my DNS. Not sure what country you live in, but it sounds like China at that rate.

[–] SapphironZA@sh.itjust.works 2 points 7 months ago (1 children)

It's usually ISP specific.

Some ISPs in the USA and Germany have been doing it. This is why DNS over HTTPs exists to bypass those blocks.

[–] cyberpunk007@lemmy.ca 3 points 7 months ago

I always thought they exist because privacy. Regular old DNS requests are not encrypted so even if you send a request to 9.9.9.9 your ISP can still see it.

[–] hatedbad@lemmy.sdf.org 1 points 7 months ago (1 children)

TLS doesn’t encrypt the host name of the urls you are visiting and DNS traffic is insanely easy to sniff even if you aren’t using your ISPs service.

[–] cyberpunk007@lemmy.ca 4 points 7 months ago

Yeah, my point exactly.