ISP sends mommy the internet logs for the last 2 years

>ISP sends mommy the internet logs for the last 2 years

Other urls found in this thread:

nsa.gov1.info/utah-data-center/
gov1.info/
twitter.com/SFWRedditGifs

...

How fucked would you be if your internet and Sup Forums post logs would be sent to your mom and local authorities?

That's what you get for not using Tor...

Not at all, since ISPs can only see the host site, not the full URL
And the things you post are irrelevant if you have a dynamic ip, since you can just say it wasn't you

i don't do anything illegal on the internet, nor do i post controversial opinions. my mom knows i post here, too. i would be fine.

>Not at all, since ISPs can only see the host site, not the full URL
going to need a source on this.

my isp cant see any of the more questionable things that i do, but my mom would find out that i like big hairy muscle daddies and she hates faggots so id most likely end up on the street

not bad i only browse Sup Forums Sup Forums /e/ Sup Forums /c/ /u/ /w/ /t/ /h/ /ck/ Sup Forums /tg/ /d/ /aco/ /biz/ /diy/ /his/ /lit/
could of been worst

pretty much this desu, I refer to Sup Forums as the "frog forum" when talking to family members

Under https the ISP can only see a connection to an IP.
Under http, yeah, sure, the ISP can see everything. Lesson: Don't use http.

id be so fucked that id just break down in laughter

Internet traffic is an encrypted system, user
Your ISP sees who sends the package and who it's sent to, but they won't see the information of the package
So they'll see that you visited Sup Forums.org or pornhub.com, but they won't see that you were looking at copious amounts of trap porn

>they won't see that you were looking at copious amounts of trap porn
Uh, yes they will because almost everyone is using their ISP's default DNS servers.

if, and only if, the site youre on is using https, they technically shouldnt be able to see what sites you visit and what youre doing on the site. they can, however, see you dns queries. a simple solution is to use an alternative dns server like opennic.

if the site is using plain http, they can see everything.

>He's on the grid

When using a website that has HTTPS he's correct. The destination of the packet is unencrypted (what server & what port on that server you're talking to) because it has to be for routing, but the URL is stored inside the HTTP header is encrypted and thus can't be read.

Technically in some rare situations this makes it impossible to tell what website you're using as well. You can configure a webserver to accept connections on port :80 but forward those connections internally to different servers based on the HostName field in the HTTP header. This means you could have a single server, say 123.123.123.123:80, that accepts connections for both YouTube.com and Sup Forums.org and differentiates between them based on what you typed in your URL bar.

They can see that you went to trapporn.org but they don't know what you did there.

well, are you going to share??? don't be a faggot user

>And the things you post are irrelevant if you have a dynamic ip, since you can just say it wasn't you
Supposedly ISPs keep logs of who was assigned what IP address when, if those logs are coming from your ISP you likely wouldn't be able to deny it.

Well of course you'll make it blatantly obvious if you visit sites like that, but do you seriously think the normies at your ISP are going to know what danbooru is?

The name of the page is being looked up by the ISP's DNS servers which will probably log it permanently, they'll know you went to trapporn.org and that you clicked on X video and Y video.

share hwhat

Emphasis on the word "supposedly"
Supposedly I also have a nuclear weapon, but you can't say it's true

Oops I made a mistake in this, technically it would be port 443 if you're using HTTPS.

Uh, no? DNS servers resolve IPs to hostnames, they don't resolve RESTful URL navigation. DNS turns IP --> .com, and what your browser does it is sends a HTTP request asking for /femboys/01.jpg directly to the IP.

>last two years Internet activity
>80% on Sup Forums
>15% on porn
>5% on steam

I pretty much have no idea what other sites to use when I'm not on Sup Forums. I only got a smart phone because I heard about Clover on here.

If it's passing through anything the ISP owns you're fucked

They log activity. They'd need them for monitoring network abuses and datacaps (if used), as well as any legal reason. Don't try to give people a sense of anonymity. If you've ever gotten a C&D letter weeks after the fact then this should be obvious.

Now they'll know you don't know it's "could've". That's far more degenerate.

those pics

literally why does an isp care about any logs besides traffic?

t. Does not understand encryption

MAC addresses can be spoofed, faggot.
It they are smart enough, they will keep a record of your NetBIOS name if you use Windows, but they are usually not that smart. If you go in court over some shit you did, the NetBIOS name and your MAC together are usually enough proof that this is indeed you.

In some Orwellian countries such as the UK they are required to retain logs by law.

Except data caps are regulated via specific ID, not by IP
Dynamic IPs can be traced, but considering there are thousands of people who can have the same IP as you, you have nothing to worry about if all you do is shitpost on Sup Forums

Why on earth would they use MAC addresses (which as you correctly point out can be spoofed) when they could just use the credentials you put into the modem to connect to the WAN?

Hello Jimmy,
make sure your sites use https + use a VPN for browsing controversial / politically incorrect / adult websites, I recommend either Windscribe or ProtonVPN
protip : Proton is completely free and in Windscribe, you can enter 50GBFREE for free 50 GB / month
also change your DNS servers to openDNS
or move into eastern Europe, here ISP's don't even implement their own DNS servers to spy on you, VPN does the trick
Now, back to sleep Jimmy, this site is 18+

Sup Forums deletes archives and my isp only knows i go to Sup Forums. anything beyond that is encrypted because https

1) Some networks can be as simple as a gateway + DHCP, no fancy PPPoE/CHAP auth.
2) Somebody else can use your credentials.

"user, what is this "Futanari" that you keep searching?"

Could you make an ad hoc network that obfuscated everything you viewed using this method, then? Sort of a pseudo-VPN usable through a browser and without credentials?

>not using https on search engines
kys

>go to loverslab for skyrim mods
>search futa
>realize it's only http
>my future employer know knows i jerk off to futas because my isp sold them the data

isp still sees with tor. it's the site that can't see.

you are 30 fucking years old move
out and stop calling her mommy

>Some networks can be as simple as a gateway + DHCP, no fancy PPPoE/CHAP auth.
Then maybe on those networks you do have plausible deniability, but I've never heard of such a thing.
>Somebody else can use your credentials.
Lmao.
"user why is there trap porn in your Google Drive?"
"Somebody else was using it"
"user why did you buy several kilos of Uranium with your credit card"
"Somebody else was using it"
"user why did you car run over somebody last night?"
"Somebody else was using it"
You can *always* claim that nonsense, good luck getting anybody to swallow it though.

>with tor. it's the site that can't see.
are you sure ?
Tor essentially re-routes your traffic through its servers so all that ISP sees is encrypted gibberish

>Misspelled "Fortran", mom.

My ISP saves nothing

where do you live ?
AFAIK pretty much every country with internet access has laws that bind ISP's to log user traffic, if for nothing else then for potential criminal investigation.

Yeah, you could, you might need to throw together a custom web server for it as I don't know if Apache has a "passthrough any hostname" option.

The usefulness of it depends on your threat model. If you just don't want your ISP/parents/building sysadmins/etc. to know what you're doing this will render their logging useless. If you don't want the government to know what you're doing you'll need to get multiple people to use your pseudo-VPN otherwise it's obvious all the connections coming out of the VPN are you.

Could've had and may have*

But no, not really, it'd be piss easy to pair an account up with an IP held, equally easy to retain the information for something like 30-90 days. And depending on your local network, provider, and the social strata around you rotating into or out of a new address isn't as easy as you may think. Even if your ISP isn't watching there are third parties capable of doing at least minimal profiling on an individual and attaching an address to outright spying.

I'm hoping the signal-to-noise ratio would save me.

>but I've never heard of such a thing

Maybe if you leave the UK, you will.

Except what you post isn't sent to your ISP dumbass, they'd literally have to contact the server administrators of the site and even there the information isn't retained infinitely
So as I said, as long as you don't traffic child porn or some shit, you have literally nothing to worry about

Yeah, it'd definitely be public, I think that's the most appealing feature of it is that it's a paper remedy instead of a lead cure. Instead of tunneling traffic you're just rubber stamping it, right?

wrong, ISP may see you are using an encrypted connection that looks like tor but does not see anything else

No. These are the parties in a Tor connection and what they can see:

You can see what's being sent and who all the Tor nodes are, but not where the site is.

Your ISP and other local attackers can see you're connecting to the first Tor node, but nothing else.

The first Tor node can see who you are and who the second Tor node is, but not what's being said.

The second Tor node can see who the first Tor node is and who the third Tor node is, but not who you or the site are or what's being said.

The third Tor node can see who the second Tor node is and who the site is, but not who you or the first Tor node are. If the site itself doesn't use HTTPS, the third Tor node can also see what is being said.

The site can see what is being said who the third Tor node is, but nothing else.

I'm not in the UK.

My mom will think nothing of my trap searches.

They really don't care what 99% of people do, but that doesn't change the fact that they take basic logs on their network. It's blatantly wrong when anyone tries to assert that dynamic IPs gives people any amount of plausible deniability. All it's doing is lengthening court cases by lending a crappy argument to defendants.

>mom gets a dozen DMCA emails a week from comcast for the last 15 years
>"oh, i just delete that stupid shit"

It's not entirely wrong. Dynamic IPs give you plausible deniability in less legal matters. They stop websites from working out who you are quite so easily.

>mom gets dmca in the mail
>storms into my room telling me to delete game of thrones
at least it wasnt porn

>crappy argument to defendant

One that's been working for years now.

could HAVE

>of
>worst

>dad gets DMCA from ISP
>asks if i have the show on a USB stick
:^)

>what is https
>what is end2end encyption
>what is tor
>what is pgp

>talking to family members about Sup Forums
peak autism

I don't think ISPs really care about much unless there's some possibility of legal action against them, so that's true. I was thinking about legal matters.
Where? I've never seen any court case where a dynamic IP invalidated a whole investigation.

>90% of requested domains are ads and third-party js

Sup Forums isn't https. Or at least it isn't for me right now.

notice settings in upper or lower right corner, click, miscellaneous, always use https click, save settings, install https everywhere

i usually just banter a few burgers and say nice things to raging poltards who are writing bullshit about holocoust, ww2 and racism.
i am good guy :)

>your mom doesn't know what 'hentai' is, so all the 'exhentai', 'e-hentai', 'nhentai' logs don't mean anything to her
>she doesn't even know how to pronounce gelbooru or danbooru, she'll never know what they are
>you are basically only in deep shit for any 3dpd porn (more obvious names) or anything the normie news scared her into hating (maybe something tor-related?)

on top of that, how much is she really gonna look through 2 years of logs? not like your mom knows how to use grep, sort, uniq, etc.

Out of context you can laugh, but it's really not that weird. It's just an offhand remark mid-story usually, at least for me.

>I was reading /out/ earlier and learned some cool stuff about hatchets
Worst thing that's happened is I have a dozen of these small stories and then hear something like "What's 'out'?" or "What's 'vp'?", and I have to live with the fact that they weren't fully appreciating the story from the start, and they waited that long to say something.

>have not learned how to say "on the Internet"

That sounds extremely awkward. It'll just result in more follow-up questions, and then when I give up the info anyway, it'll just seem like I was hiding something.

This just gave me an idea, though. If you personify all the Sup Forums boards and/or websites you visit, you can tell stories the old way, like you just heard some info from a guy you came across one day. You could just replace Sup Forums with "Gary".

>I was talking to Gary about the recent equifax breach. It's not looking good.
Only issue I see right away is if there are real life people you or the person you're talking to happen to know with the same name. I know an Oscar, so I can't use that for /out/, but it's tough to think up another name starting with O quickly.

Why is the ISP sending you the logs?

You really are a special kind of stupid, huh?

No. If the server doesn't accept HTTPS, the traffic needs to be decrypted at some point before being sent to the server.
It has to be transferred cleartext at some point. Now the optimal thing is to have a VPS that you can use as a VPN, which hides the traffic from your ISP. So long as you bought the VPS anonymously, then the cleartext comes from the VPS and isn't linked to you. Besides through an IP though, since whoever is hosting the VPS could keep their own logs, technically.
You're better off just not using http. Ever.

You do know what encryption is, right?
Until ISPs can break 4056bit RSA and/or 256bit AES, you're fine.

What reason would a server ever have to not accept HTTPS?

If it's ran by retards. Before letsencrypt, you had to spend at least $30 on a TSL Cert from a CA, so there was a culture of 'just encrypt login forms'. It still hasn't left.

internet generated gorilions of data traffic every year, i can hardly believe they keep these logs more than few months, they would have to invest in some data center, thats a lot of money for keeping logs no one cares about

to my family Sup Forums is just an imageboard/forum like site

They'd have to invest in at least 7 data centers, user.
But I mean, just because the NSA built massive structures all around the country called 'data centers', it doesn't actually mean that the NSA collects data.

He doesn't know.
nsa.gov1.info/utah-data-center/

>As proof of our genuine concern for privacy protection, we recently gave permission for several privacy groups to fly their little blimp over our massive data center. We would like to thank these airborne privacy pioneers for the stunning photo below of our impressive facility. By allowing harmless publicity stunts like these, we can have our data and store it too.

I... I can't decide if this is satire or not.

>gov1.info/

>future employer will ask me why I visit a site that only shows him a sad panda all the time

>underage
B&