If you have HTTPs everywhere on, how much harm can a malicious wifi network do?
from IDKWhatUsernametoPutHereLolol@lemmy.dbzer0.com to privacy@lemmy.ml on 24 Feb 19:23
https://lemmy.dbzer0.com/post/38580115
from IDKWhatUsernametoPutHereLolol@lemmy.dbzer0.com to privacy@lemmy.ml on 24 Feb 19:23
https://lemmy.dbzer0.com/post/38580115
I kinda don’t trust my home network because my brother is douche and I feel like he’s gonna do some weird things with the connection, so I prefer to juse use my phone’s data (unlimited data plan) to avoid any shenanigans. Hypothetically, how much harm can an evil wifi do?
Does using HTTPS avoid all risks? What about evey program on your computer or every app on your phone, do they also have HTTPS everywhere on? (I use Android btw)
How much could a VPN do better that HTTPS cant?
threaded - newest
The HTTPS everywhere extension only covers the browser. Other applications might be vulnerable. If he controls the network, he could hijack your DNS and intercept all other connections. He could also use a downgrade attack to force an insecure version of TLS and compromise that.
But that’s extremely unlikely, unless he’s either a skilled attacker or can use tools like metasploit.
Kind of depends. The one thing that an untrusted network may be able to do is adjust routing tables. Some systems and some VPNs may be protected from this, some may not. At least the https connections should be secure but where you’re connecting can be trracked. DNS is vunerable too unless you set your browser system to use a secure connection to DNS server you trust.
HTTPS encrypts traffic making it hard for packet sniffers to know what is being transferred. If you are using unsecured WiFi, there is a chance of DNS manipulation like, switching domain names etc. If you’re using VPN, you hide your identity (IP) from the websites you visit and also if its configured to use their own DNS server, you can somewhat eliminate the DNS manipulation.
Anyways if you’re not sure, try to use a VPN and HTTPS everywhere and use firewall to lock down all your exposed ports. I don’t know how to configure firewall for port lockdown in android, but Rethink DNS (check Fdroid) is kind of helpful here.
Correct. Rethink DNS covers private DNS, VPN connections, and firewall for android.
Rethink does not have built in vpn, but can use wireguard config
Yes, this is what I’ve said.
If beginners are reading, don’t panic. This advice should be taken with a grain of salt. I remember being a beginner and getting this kind of advice and how it caused me a whole of lot of completely unnecessary anxiety.
VPN: all but unnecessary for security purposes (it’s useful for geo spoofing). If you really don’t trust your wifi, then start by manually setting your DNS (to 1.1.1.1 or whatever) as others have said.
HTTPS everywhere: sure, and this is now the default in your browser.
Firewall: totally unnecessary to fiddle with this on a home PC. It will be hard-set in your router anyway, there’s nothing to worry about.
As others have mentioned, DNS is probably your worst enemy. It doesn’t take much technical knowledge to just create a DNS server and start logging all domains you’re accessing. Say, to tell mom how often you’re browsing porn or something.
Manually configuring DNS servers in your OS would resolve this issue, but also using VPN like mullivad would just bypass such worries with 99% certainty.
Or just keep using mobile data, because why not
Correct me if I’m wrong but- manually configuring your DNS in the OS would still enable traffic monitoring, wouldn’t it? I always thought DNS traffic is not encrypted by default.
Generally true. You would want to use DNS-over-TLS (DoT) or DNS-over-HTTPS (DoH) to be sure your DNS queries are encrypted in transit.
Technically if you have a NAT redirect rule that routes all outbound traffic on a specific port, you could redirect to port 53 on the pihole and it would be visible because the DoT/ DoH terminates at the Pi which his brother could control? VPN is still a safe bet.
You can redirect regular DNS like that, but DoH/DoT is encrypted using certificates with a chain of trust just like any other tls connection (that’s kind of the whole point). It would throw security errors breaking dns resolution if you redirected the connection to your own server.
You would still be better off with a vpn wrapping the connection however as the SNI in each https connection is unencrypted and can be used to log your traffic.
That’s true. Was going to setup a NAT rule to test it out but then realized that there’s no way I can redirect outbound traffic on 443 to a Pi Hole on 53, lol.
Oh, yeah you’re absolutely correct. I was fixated too much on the DNS logging lol
DoH (DNS over HTTPS) or DoT (DNS over TLS) would fix that
Actually no. The SNI is still not encrypted. So every site you are visiting can still be sniffed.
This is resolved in TLS 1.3 with ECH. Adoption is still not wide though, so your concern is valid.
Was not aware ECH was actually in TLS 1.3 thanks for that. But yes it will take a long time for widespread adoption.
I’ve configured my home wifi to capture all DNS regardless of its intended recipient. It’s unencrypted so it’s possible.
I also use encrypted DNS on my phone.
That merely moves it to the carrier knowing, though, right?
Nope, but OP mentioned in the post that they’re sketched off from their brother who’s in control of the home network
I think there’s some fundamental misunderstandings about what each technology does.
In your case, your brother could mess with the DNS on the router to send you wherever he wants when you type in google.com, he could set up a hosts file to block you from going to specific sites or IP addresses, or he could manipulate any unencrypted data packets you receive.
Using your phone internet just puts your privacy in the hands of your phone’s network operator instead. How much do you trust them not to rat you out?
If you want anonymity or ways to get around blocks, you need to use a logless VPN at minimum or something like Tor, depending on your needs.
Https only encrypts the packet content.
What can happen:
TL;DR: Evesdropping, spoofing, device vulnerabilities (e.g. using exposed ports).
A VPN will prevent the first two attacks.