• BlackEco@lemmy.blackeco.com
    link
    fedilink
    English
    arrow-up
    15
    arrow-down
    6
    ·
    edit-2
    1 year ago

    Excuse me for my lack of understanding, but why are there so many people looking to hide their traffic from their ISP with a VPN? Isn’t HTTPS enough? Are you afraid of ISPs resorting to DPI or MiM to spy on their users? Is customer protection so weak in the US that ISPs are free to spy on their customers using aforementioned techniques?

    Edit: I just realized that I left out people leaving under authoritarian regimes, for whom VPNs are unfortunately required to evade their government.

    • Skull giver@popplesburger.hilciferous.nl
      link
      fedilink
      arrow-up
      16
      arrow-down
      1
      ·
      1 year ago

      Is customer protection so weak in the US that ISPs are free to spy on their customers using aforementioned techniques?

      ISPs not only sell cell location data to bounty hunters/anyone who can fork over money, they also sell ad targeting information about their customer. They have also injected Javascript into pages (selling new modems) and add(ed) unique headers to HTTP traffic so websites could identify individual users despite their best attempts.

      Not all of them do all of this crap, but this shit is one of the reasons Mozilla enabled DoH in the USA by default. It also helped the push for getting HTTPS everywhere.

      • kenbw2@lemmy.world
        link
        fedilink
        arrow-up
        4
        ·
        1 year ago

        They have also injected Javascript into pages (selling new modems) and add(ed) unique headers to HTTP traffic so websites could identify individual users despite their best attempts.

        This must have been pre-HTTPS since you’d need to MitM the SSL certificate for that to work

    • FarLine99@lemm.eeOP
      link
      fedilink
      English
      arrow-up
      10
      arrow-down
      2
      ·
      1 year ago

      Because HTTPS protects only things you do on the site. ISP still knows which sites you connect to. Which YouTube video you are watching to. etc. F.E. in Russia ISP’s have to keep logs of users interactions for half of year and give it to government when they need them.

        • FarLine99@lemm.eeOP
          link
          fedilink
          English
          arrow-up
          6
          arrow-down
          1
          ·
          1 year ago

          My opinion. I can’t trust any government on this planet anymore. So much fuck ups and stupid decisions. So basically every government is kinda authoritarian for me…

      • BlackEco@lemmy.blackeco.com
        link
        fedilink
        English
        arrow-up
        7
        arrow-down
        2
        ·
        edit-2
        1 year ago

        ISP still knows which sites you connect to.

        Yes, because they know the IPs your packets go to, but if there are multiple websites behind a single IP they won’t know which one (unless you use your ISP DNS server, which you should probably not)

        Which YouTube video you are watching to. etc.

        No, because the URL is contained within the HTTP packets which are encrypted with SSL (the S in HTTPS), so unless the ISP does MiM, they cannot know which URL you are visiting.

        • Yes, because they know the IPs your packets go to, but if there are multiple websites behind a single IP they won’t know which one (unless you use your ISP DNS server, which you should probably not)

          That’s not true. Almost all TLS clients use SNI to send the server name in plaintext, so the server can present the right certificate. With QUIC/http3, this is no longer done in plaintext, but the packet is still being sent alongside the initial encryption key so anyone with access to the traffic can simply decrypt these packets.

          There are trials out there for ESNI/ECH, which encrypts the SNI fields in a way the ISP can’t read, but those are far from stable, not implemented by most web servers, not enabled by default by web browsers, and require additional setup for website admins (read: won’t be widely implemented for another five to ten years).

          The URL and Host header are encrypted of course. Your ISP can find out you’re going to youtube.com, but not what video you’re watching.

          • BlackEco@lemmy.blackeco.com
            link
            fedilink
            arrow-up
            5
            ·
            1 year ago

            Oh, thanks for this precision, I wasn’t aware of this. And now that I think of it, it’s obvious that the first exchange with a server has to be unencrypted

        • FarLine99@lemm.eeOP
          link
          fedilink
          English
          arrow-up
          1
          arrow-down
          2
          ·
          edit-2
          1 year ago

          Hmm… You have way better knowledge than I am. It seems so. Should think about this things some time later 😉

    • squiblet@kbin.social
      link
      fedilink
      arrow-up
      10
      arrow-down
      3
      ·
      1 year ago

      To me, the problem is you are instead giving over all of your info to the VPN company, and still be tracked by other means such as fingerprinting of devices, cookies/site data or browsing patterns. Is some random VPN company more trustworthy than my ISP and who’s to say they aren’t sharing the information? Plus, the could also be subpoenaed/NSLed if that’s the concern.

      • howrar@lemmy.ca
        link
        fedilink
        arrow-up
        11
        ·
        1 year ago

        I’d be more willing to trust a VPN company with this data than an ISP. The former’s entire business hinges on providing privacy to their customers while the latter can just sell your data to whoever they want and most people wouldn’t bat an eye.

        • squiblet@kbin.social
          link
          fedilink
          arrow-up
          3
          arrow-down
          1
          ·
          1 year ago

          I’d have plenty of questions about the VPN company though. Some of these would be the same as ISPs, some worse for VPN companies.

          • do we know if they’re compromised by our government or a foreign government?
          • Are their systems actually secure?
          • do they explicitly share data with a government, like they may be forced to?
          • do they sell data and just lie about it?
          • do they actually log data and lie about not logging or deleting it?
          • what if they do something like an exit scam where it turns out they did collect all your info, and then sell it before they close up shop?
          • howrar@lemmy.ca
            link
            fedilink
            arrow-up
            1
            ·
            1 year ago

            Legitimate questions, but why would it be worse for VPN companies?

            The way I see it, I have no way of verifying the answers to any of these regardless of whether it’s an ISP or a VPN, but I do know that VPNs have a greater incentive to provide you with proper privacy because if they were found to fail at this, the entire business dies. ISPs run no such risk, especially since many of them are effectively monopolies.

    • KitsuneHaiku@ttrpg.network
      link
      fedilink
      arrow-up
      6
      ·
      1 year ago

      Because my ISP stopped my internet access last time they were contacted by a copyright holder whose thing I torrented.