So now what? Do all your browsing through Tor to avoid this and with JS disabled so websites can't fingerprint you? Remember when you only had to be paranoid like this if you wanted to hide from the government instead of regular advertisers?
A good VPN is probably good enough. Tor is slow and attracts scrutiny, but is better for extremely sensitive browsing.
Charles Thompson
>A good VPN is probably good enough Did you even read those links? Or perhaps you think it's possible for packets to teleports to your VPN by the power of magic. Eitherway,
Jordan James
how are they going to inspect https packets? http is going to be deprecated soon.
Easton Lee
>how are they going to inspect https packets? They aren't. This is precisely what TLS is for.
Nathan Hall
You don't know how a VPN works, do you ?
Even HTTPS can protect partially from spying. Your ISP could still sell to advertisers the list of websites you visit, but nothing more.
That's why a basic VPN, a SSH tunnel from a VPS or TOR can protect you from that.
Dominic Kelly
And how exactly do they decrypt the data?
Benjamin Robinson
...
Bentley Evans
checked :^)
Lincoln Allen
nice digits
Kayden Thompson
so what does it matter? is my ip gonna hack my browser and advertise shit i never look at?
Daniel Lewis
You clearly don't even have the first clue about technology. You don't belong on Sup Forums.
Noah Evans
Unless the ISPs are doing timing attacks on the requests going to/from VPNs, they should be effective. Don't know if I'd trust a VPN though in that situation as such a timing attack likely wouldn't be to complicated considering timing attacks on Tor are theoretically possible if you control enough nodes.
Cameron Morales
There is no such thing as privacy on the internet.
Alexander Cox
Your ISP cannot decrypt an end-to-end encrypted VPN connection. Pls go.
Colton Torres
HTTPS can defeat DPI, what are you even on about? At worst they can see the sites you visit but not the content if you are using HTTPS.
Justin White
cuck go home
Ayden Richardson
Except for anonymity, private messages, private websites, end to end encryption.
Jordan Watson
ISPs can't do shit and you know it. Deal with it, goy.
Thomas Harris
>Unless the ISPs are doing timing attacks on the requests going to/from VPNs That's exactly what metadata includes, dumbass.
Juan Gray
Here's how basic encryption works friendo.
You send a site a request with your public key and they send you a response encrypted with your key.
Only your private key can decrypt this response.
In this response is their public key.
You send them the actual important shit encrypted with their public key.
Likewise only their private key can decrypt this response.
Cycle continues.
Nathan Ramirez
No you fucktard, your ISP is not spending effort cracking your encrypted communications to sell you tampons.
Jeremiah Long
marry me
Xavier Edwards
>This is precisely what TLS is for. The ISP can block encryption.
"Golden Frog performed tests using one mobile wireless company’s data service, by manually typing the SMTP commands and requests, and monitoring the responses from the email server in issue. It appears that this particular mobile wireless provider is intercepting the server’s banner message and modifying it in-transit from something like “220 [servername] ESMTP Postfix” to “200 ********************.” The mobile wireless provider is further modifying the server’s response to a client command that lists the extended features supported by the server. The mobile wireless provider modifies the server’s “250-STARTTLS” response (which informs the client of the server’s capacity to enable encryption). The Internet access provider changes it to “250-XXXXXXXA.” Since the client does not receive the proper acknowledgement that STARTTLS is supported by the server, it does not attempt to turn on encryption. If the client nonetheless attempts to use the STARTTLS command, the mobile wireless provider intercepts the client’s commands to the server and changes it too. When it detects the STARTTLS command being sent from the client to the server, the mobile wireless provider modifies the command to “XXXXXXXX.” The server does not understand this command and therefore sends an error message to the client."
Caleb Baker
>This is precisely what TLS is for.
Encryption only works if the ISP doesn't block it.
"Golden Frog performed tests using one mobile wireless company’s data service, by manually typing the SMTP commands and requests, and monitoring the responses from the email server in issue. It appears that this particular mobile wireless provider is intercepting the server’s banner message and modifying it in-transit from something like “220 [servername] ESMTP Postfix” to “200 ********************.” The mobile wireless provider is further modifying the server’s response to a client command that lists the extended features supported by the server. The mobile wireless provider modifies the server’s “250-STARTTLS” response (which informs the client of the server’s capacity to enable encryption). The Internet access provider changes it to “250-XXXXXXXA.” Since the client does not receive the proper acknowledgement that STARTTLS is supported by the server, it does not attempt to turn on encryption. If the client nonetheless attempts to use the STARTTLS command, the mobile wireless provider intercepts the client’s commands to the server and changes it too. When it detects the STARTTLS command being sent from the client to the server, the mobile wireless provider modifies the command to “XXXXXXXX.” The server does not understand this command and therefore sends an error message to the client."
Noah Taylor
Stop shitposting you fucking nigger
Juan Hughes
Wait, what if they inspect the packets and get a source and destination mac address. WITHOUT A WARRANT. We are all doomed. ISP's have gone too far. What if police see your car parked in a driveway or public parking spot. WITHOUT A WARRANT. We are all doomed. The police have gone too far. What if I say hello to someone and give them my first name, WITHOUT A WARRANT. We are all doomed. Strangers have gone too far.
Nathan Ward
Did not mean to double post. I thought the first post got ate after not appearing after a few minutes.
Evan Russell
>cracking your encrypted communications Except that isn't necessary. The VPN is sending and receiving packets using the same ISP, unless said VPN randomizes the time between it receiving a packet from you/the website you're using and sending out a packet to you/the website you're using, it would be trivial for the ISP to correlate the packets traveling to/from the VPN with a good deal of certainty.
Then delete the second post you retard, don't make yet another post about it.
Tyler Jenkins
>SMTP >mobile wireless
We're talking about internet browsing (SMTP is for mails). Also, everyone knows that what you do on a smartphone can't be private in any way.
Wyatt Cox
You don't understand anything about encryption, do you ?
You're not even in high school nigger
James Hall
ahaha stay in school kid. VPN and HTTPS use end to end encryption. Meaning if you are anywhere in the middle you get nothing but cryptographically secure garbage.
>The VPN is sending and receiving packets using the same ISP, unless said VPN randomizes the time between it receiving a packet from you/the website you're using and sending out a packet to you/the website you're using, it would be trivial for the ISP to correlate the packets traveling to/from the VPN with a good deal of certainty.
No you complete idiot, the packets exit on a different ISP than the one you're on. Nothing can be correlated.
Caleb Wood
Blocking TLS for SMTP isn' that different from blocking TLS for everyday browsing.
Alexander King
Instead of hanging out on Sup Forums you should hang out in your middle school classes. Or on a rope.
Cooper Moore
holy shit you're the one that doesn't understand technology
Juan Stewart
>come to this thread hoping to get a better insight in DPI
>one guy it actually unfamiliar with the concept of cryptography >others will argue with him until the thread dies
This is not the Sup Forums I was promised.
Josiah Baker
I love this thread.
Dylan Collins
let's just say that none of us actually understand technology and move on
Joseph Hill
Except your fucking wrong. I understand technology just fine.
Nathan Bennett
>VPN takes X amount of time to forward packets >ISP sees encrypted packet from a user going to a VPN on their network >ISP sees packet leaving the VPN and going to a website X amount of time later >ISP then knows what user sent that packet
>HTTPS use end to end encryption They can still get the data about the websites you visit as that isn't encrypted (otherwise your packets wouldn't make it to the website you're trying to go to).
>the packets exit on a different ISP than the one you're on They can look up what ISP you're using from your IP range and could sell the data to your ISP who can then sell it to advertisers.
Kevin Hughes
If you wanted to get better insight into a topic and learn something, you seriously thought Sup Forums would promise you that? The only thing you come here for is retards arguing about how smart they are by saying things that are completely false. They are just like extremist liberals.
Evan Long
are you trolling or retarded
Jace Turner
>HTTPS use end to end encryption What about all the sites out there that still don't use HTTPS?
Jayden Smith
...
Hudson Hernandez
Those are irrelevant to this argument.
In fact, let's stop arguing about this, there are obviously trolls among us and this had the potential to be a good thread. Just ignore the trolls, everyone can recognize them anyway.
Caleb Perry
> full house of truth
also, > selling data to advertisers And what the shit are they gonna do with it? I keep hosts files, I use adblockers, I will browse the internet in fucking w3m if neccesary. They can lick my shit. All that data is wasted bandwith, space and processing if they don't get shekels for it.
Jose Sanders
t. inbred
Connor Perez
That's like asking me about doors without locks on them.
Let's try to think about this with common sense. 1. A door has a lock on it. 2. I can't get into it.
1A. A door does not have a lock on it. 2A. I can get into it.
Using our critical thinking skills, we can deduct that http traffic is insecure and anyone in the middle can intercept and inspect all traffic including content, passwords, and sensitive information.
Using this same logic, we can deduct that yelling your SSN in the middle of a populated area is also inherintly insecure, and anyone within earshot will have your private information.
Adrian Reyes
Sup Forums used to offer just that because people who didn't know shit didn't try to pose as field experts with 50 years of experience when they were told to fuck off. They used to inform themselves and either not reply or respond with information that was at least google'd thoroughly. Even then the rate at which people spouted absolute bullshit not even remotely related to reality was virtually 0 compared to nowadays.
Asher Rodriguez
>Those are irrelevant to this argument. >commonly used web services that are vulnerable to deep packet inspection are irrelevant to discussion about deep packet inspection
Isaiah Wilson
I like how everyone thinks the site used to be so good and has recently gone to shit. Nothing has changed it's the same site it has been.
Henry Lee
Irrelevant to the argument in this thread you were actually replying to.
Isaac Wood
>I'm an oldfag I've been there all summer!
Gavin Taylor
>HTTP is vulnerable to DPI >VPNs aren't particularly effective when the adversary owns the network you are using >Tor does not have this problem due to increased complexity VPNs are shit for this situation, deal with it.
Christopher Williams
You win m'lady. I yield to your expertise. TOR is the only way to preserve our right to refuse DPI or any type of monitoring/advertising.
Julian Myers
So someone should completely give up on using some websites (mostly news) instead of accessing them through a service such as Tor?
Henry Edwards
Oh absolutely. And you should also be wearing tin foil on your head at all times. It's the only way to keep people from reading your mind and stealing your ideas for themselves.
Josiah Ramirez
>You send a site a request with your public key and they send you a response encrypted with your key. What's stopping my ISP from intercepting my key? Then the whole thing is pointless
I can drive to a strip club and give people my first name, and people can even see my car outside. But it would require a creepy stalker to actually tie these things together and get my identity, sell the facts to some random company who then sends me mail with advertisements about their products.
The creepy stalker in this scenario is the ISP.
Isaac Anderson
I'd probably do it for the hell of it, but not to turn a profit.
Ian Sanders
>what is a side channel attack
Nathaniel Garcia
Like someone who goes to parking lots and leave you flyers on your windshield? What a stalker.
Benjamin Myers
>Like someone who goes to parking lots and leave you flyers on your windshield? What a stalker. If they were following you around everywhere and keeping tabs on your movement so that they could sell the information to advertisers, yes.
Oliver Ward
if you walk around with your username and password printed on your T-shirt it's not an invasion of privacy when someone logs into your account.
Carter Allen
>never do anything, that's how you stay safe
Gabriel Williams
>username and password What does that have anything to do with this situation?
Nolan Davis
Don't fuck your girl in public and don't wear a ski mask to the store. Seems pretty easy to me.
Austin Flores
Basically saying don't share private information with the public, and don't try to hide public information that doesn't matter.
You don't walk around town with a Guy Fawkes mask on, people see your face, you don't care. Care about your privacy that matters, and keep it secure.
Cameron Sanchez
>Basically saying don't share private information with the public, and don't try to hide public information that doesn't matter. They can still gather information about what news you read and sell that to advertisers. They can learn a lot about someone that way.
Kevin Taylor
best part about this is even if you're on a freedom loving ISP your packets can still be spied on when they leave one ISPs network to another for faster path
Matthew Garcia
>http is going to be deprecated soon. They managed to block that by interfering with the standards process. We live in an age of limitless corruption.
Jaxon Watson
"Advertisers" could be anyone. Background checking agencies responsible for employment screening, for instance, could buy a report on how much you agree with their political bullshit without even reading your resume, let alone getting your permission to do so. Not that google and facebook aren't worse since YOU CANNOT BLOCK THEM, but still, fuck ISPs.
Kevin Kelly
>the year is 2016 >wake up in the morning >turn on my computer with an Intel Botnet Engine enabled processor >go to my kitchen >my botnet of things coffee botnet is already brewing my a cup of coffee from a DRM enabled coffee cartridge >return to computer to see it's fully booted into Microsoft Botnet 10 >connect to the boternet with Google's Botnet browser >remember something I was thinking about last night and use Google's botnet engine to search for it >find a result on botnetbook and go to it >get a call on my smartbotnet >boss needs me to come in today >hop in my car with the mobile botnet package and head to work It isn't a grave, it's the botnet you chose.