Protect myself from my ISP?
from certified_expert@lemmy.world to privacy@lemmy.ml on 13 Mar 20:58
https://lemmy.world/post/44220443

Noob here. This is probably the most repeated question, but I don’t know the technical terms to make the appropiate digging online, and thought of asking humans before slopping my way around.

I don’t trust my ISP or the government above it.

The ISP remotely manages the local network! So I installed a router of my own and my devices only to that one.

I would like to encrypt (?) anything that goes out of my own router, so my ISP doesn’t evesdrop what I’m doing even if they want to (I know I know… if they really wanted, they could just send friends to my house).

Using Linux, Android GOS, and Pihole. They live under a “picked-up-from-a-shelf” router; and that router under theirs.

(I cannot get a different ISP)

Thanks

#privacy

threaded - newest

unknowablenight@piefed.social on 13 Mar 21:02 next collapse

A VPN? That routes the traffic to the other server, so the ISP can only see you’re connecting to a VPN. Most people recommend Mullvad, I personally use Proton and Windscribe, both free, open source, and trusted.

certified_expert@lemmy.world on 13 Mar 21:05 collapse

Can it be installed at a network level, rather than at a device level (like pihole)?

Gulliver@lemmy.zip on 13 Mar 21:18 next collapse

yes it can technically, but I’ve more heard about tor box than vpn box, a pi or whatever should work for both ! But only if you can install a client for your vpn, because if you don’t have one I believe you have to download a .conf file for each IP of each server you want for your vpn but they change all the time.

[deleted] on 13 Mar 21:18 next collapse

.

floquant@lemmy.dbzer0.com on 13 Mar 21:38 next collapse

Yes, but support changes depending on your router. Not many in the consumer market support it, but you can run OpenWRT on either a supported router or a Linux box with at least two interfaces - a usb adapter works if you’re on a budget, and ethernet+WiFi also counts. I would suggest looking into VPN providers that support Wireguard, as that’s in my experience both faster and more reliable than OpenVPN.

For commercial alternatives you can just buy and import a wireguard conf file into, I know MikroTik routers support it and I believe GL.iNet does too. I’m pretty sure there are more, hopefully people can contribute their experiences.

I wouldn’t recommend TOR for this usecase btw, you’d be adding a lot of latency when you don’t need the additional anonymity layer.

deadDuck@lemmy.ca on 14 Mar 16:10 collapse

Yes, GL.iNet routers have a VPN pane where you can simply enter the details of a WireGuard or OpenVPN server. I signed up for a free account at Proton, downloaded the configuration for a free WireGuard server, and installed it on the GL.iNet box. When I switch on the VPN in the router interface, all traffic flows through the VPN. I use it while travelling with my family. I can connect the travel router to the hotel or AirBnB wifi, then turn on the VPN (or not), then connect all the family devices to the travel router.

OP could do the same thing, assuming their router supports it, and set up a WireGuard VPN (much faster than OpenVPN) connection on the router and route all network traffic through it. A free VPN will always be slow and congested. A paid one is likely worthwhile in this case, especially if OP streams media.

eleitl@lemmy.zip on 14 Mar 15:12 collapse

You can run your VPN on your firewall (mine is opnsense, behind a cable modem in bridge mode). E.g. wireguard with Mullvad is a good option. Or you can set up a VPN client on your end devices – Mullvad gives you 5 endpoints for one account.

x@niwego.com on 13 Mar 21:14 next collapse

@certified_expert

I don't trust my ISP or the government above it.


I think everyone here today doesn't trust their ISP and government.

Use a #VPN or #TOR,Your ISP will only know the destination point, all traffic will be encrypted through a #tunnel

You said you installed a router. How did you configure the modem? In Full Bridge?

Also start changing your #DNS, don't use your ISP's default ones

certified_expert@lemmy.world on 14 Mar 04:53 collapse

My pihole serves dns. If not found, it goes directly to root tables (I forgot how they are called).

The router, I just connected its WAN port to the ISP’s switch/router/AP. Within the LAN under my router I have DHCP sending everybody to do lookups to the pihole. I don’t know what full bridge is.

The ISP’s modem/router/switch/AP, I cannot configure. It is a fucking “smart” brick remotely controlled.

x@niwego.com on 14 Mar 13:51 collapse

@certified_expert
so the modem that you have from your ISP it is not possible to configure it as, ONT,Bridge or Full Bridge . 🤔

Since you are just starting out, I recommend you start by subscribing to a VPN, (don't use the free ones)avoid tor for now, I use Mullvad which only allows 5 devices at the same time, but there are others, I recommend you choose those that don't keep logs.

TiredTiger@lemmy.ml on 14 Mar 18:54 collapse

If you are able to set up OpenWRT on your router and run Mullvad through that, you can cover your whole network as one “device.”

I recommend everyone get their own modem/router if they are able to. ISP’s don’t provide them for free and you have no idea what monitoring they do with their hardware.

Auli@lemmy.ca on 14 Mar 19:13 collapse

They literally to vide them for free. And why so people use their service. Do you know how many people just use their modem and they up sell people WiFi repeaters and the like. The hardware is a fold mine for ISPs.

hansolo@lemmy.today on 13 Mar 21:36 next collapse

Get a VPN. This is 50% of what they’re for.

certified_expert@lemmy.world on 14 Mar 04:56 collapse

What is the other 50%? How is a VPN trustworthy?

osanna@lemmy.vg on 14 Mar 08:52 collapse

You’re asking the right questions.

VPNs aren’t much safer. You’re putting your trust in a vpn company instead of an isp. If the vpn company is compromised (such as with Pia) then you’re no better off than if you’d not used the vpn. Tor isn’t that much safer these days since the nsa runs Tor exit nodes. Best bet is a no logging vpn. Though you’re again putting your trust in them that they actually don’t log. Whether or not they do is only known to them.

SitD@lemy.lol on 14 Mar 10:19 collapse

I think the nsa is not going to cast doubts over tor by leaking information from normal people or small fry criminals like pirates. and if you’re a dissident from a different country than usa, it’s probably also fine. I’m a lot more worried about the vpns that pay or own vpn review sites or have ties to surveillance companies

a4ng3l@lemmy.world on 13 Mar 21:46 next collapse

On top of client VPNs you might consider the possible other freebies from yr ISP such as router, WiFi access points and other network elements they provide you with. Set-op-boxes as well. All those equipments are absolutely ratting you as much as possible. Also any software including mobile apps they provide for support / billing / whatever.

certified_expert@lemmy.world on 14 Mar 05:01 collapse

I think I am not understanding this comment. I’m saying I don’t trust the ISP. Why would I invade my house and phone with more of their gadgets?

a4ng3l@lemmy.world on 14 Mar 08:19 collapse

They don’t provide you any equipment ? Then good. It’s very typical for them to do so.

scytale@piefed.zip on 13 Mar 22:49 next collapse

Other than a VPN, use a privacy respecting DoH provider on your router so all your devices use that instead of your ISP for DNS.

certified_expert@lemmy.world on 14 Mar 05:10 collapse

My router’s DHCP service is pointing clients to the pihole for DNS. Should I run that on HTTPS too? Can the pi do that?

deadDuck@lemmy.ca on 14 Mar 16:14 collapse

It’s not necessary for the pihole to run over HTTPS, because that would only encrypt traffic between the pi and your device within your own network. When the pi doesn’t have the DNS that your device requests, it looks it up from the internet. You’ve probably set the DNS lookup servers in pihole. That’s a good start to avoid your ISP. The servers you choose may support DoH, and. you should use ones that do. That way, when the pi sends a DNS lookup to the internet, via your ISP, it’s encrypted by HTTPS so your ISP can’t inspect it.

frightful_hobgoblin@lemmy.ml on 13 Mar 23:36 next collapse

This is what a VPN is for.

VPN is the answer to your question.

voxel@feddit.uk on 14 Mar 00:15 next collapse

A trustworthy VPN provider is your best solution here. Mullvad, IVPN, and ProtonVPN are common recommendations in the community. I would personally recommend against Windscribe; it is privacy-friendly but has had major bugs repeatedly in the past. If you want to go experimental, check out NymVPN and Obscura (Apple platforms only).

osanna@lemmy.vg on 14 Mar 08:48 collapse

While we’re recommending/not recommending vpns, don’t use PIA. they WERE the go to. But they’re owned by an American company now and based there.

ki9@lemmy.gf4.pw on 14 Mar 01:06 next collapse

VPN is the answer but keep in mind that you’re just moving the trust to the VPN (they can see your traffic).

The web uses a request/response architecture. Your computer requests a cat pic from the server and the server sends a cat pic back. Your real IP address must be in the request… otherwise the response cannot be routed back to you. VPNs act like couriers making requests and receiving responses on your behalf. So:

  • The cat pic server sees traffic coming from the VPN provider and doesnt know who you are.
  • The ISP sees encrypted traffic to the VPN but doesn’t know what it is.
  • The VPN sees everything.

Most web traffic is already encrypted with TLS but not the domain names and IPs (needed for routing).

If you really want to be anonymous on the web, use tor, but it’s slow and many websites block tor exit nodes so you will have a degraded experience.

certified_expert@lemmy.world on 14 Mar 05:14 collapse

If I use VPN, my isp will see that I send and receive gibblish to and from a single address (the vpn server), all over port 443, right?

If I use TOR, what does my ISP see?

SitD@lemy.lol on 14 Mar 10:14 next collapse

  1. yes
  2. the same, but probably to an even more unknown IP that is also changing frequently. the content itself should look equally random
ki9@lemmy.gf4.pw on 15 Mar 01:08 collapse

Itll go over a different port depending on the vpn protocol (i recommend wireguard). So the isp will know it’s vpn gibberish, but there are ways to tunnel the ciphertext through https again (like wstunnel). A bit overkill for your setup but comes in handy if you need to break through firewalls (if you are in china and wireguard ports are blocked but 443 is allowed)

If you use tor, your isp sees tor traffic (gibberish) but tor also supports obfuscation to make it look like http. All you need to use tor is tor browser (mobile apps exist too) so try it out… It’s free but you will see the limitations I mentioned.

sic_semper_tyrannis@lemmy.today on 14 Mar 02:24 next collapse

Once you put a VPN on your router, be sure to have a few servers setup so if one isn’t behaving right you can log into your router and quickly switch servers.

certified_expert@lemmy.world on 14 Mar 05:16 collapse

How can I install a VPN client in a router? A simple soho device, like those tplink, dlink, asus… It doesn’t support openwrt.

sic_semper_tyrannis@lemmy.today on 14 Mar 15:28 collapse

The software must support it. If OpenWRT isn’t an option then maybe another software is such as DD-WRT or FreshTomato or sometimes the OEM software does too. You could also put a dedicated firewall device before your router with OPNsense and put a VPN on that

eleitl@lemmy.zip on 14 Mar 15:08 next collapse

I also don’t trust my ISP nor my national government, which is the bulk of my private Internet use goes over a fail-close VPN.

Auli@lemmy.ca on 14 Mar 19:11 collapse

I mean all they can really see nowadays is the sni. Only thing isnt encrypted anymore. And yes their is encrypted hello bit nobody seems to be using it.

Sites are https so that is all encrypted set up DOH or DOT and your DNS is encrypted.

umbrella@lemmy.ml on 14 Mar 19:27 next collapse

sni may be enough depending on what a given oppressive isp/government wants to do.

entropiclyclaude@lemmy.wtf on 14 Mar 22:30 collapse

DoH is not as private as you think, that’s just how big tech positioned it.

DoH encrypts DNS queries between your browser and the DNS resolver, it does not hide your browsing activity from the DoH provider itself.

Google, cloudflare or any other 3rd party orgs still see your data.

I have an open source firewall on gitlab if you wanna take a look. Blocks some IPs - I know it’s not much but fuck Palantir - I made it so their site won’t load.

Blocks 50+ stalkerware apps as well as data broker trackers.

I want to go back to it so you can wire in through my VPS and build it as a mobile app to block Gemini and Apple Intelligence from scraping your photos and texts and everything to train their models.

Ascendor@discuss.tchncs.de on 14 Mar 23:04 collapse

Well how could it? Of course the DNS provider needs to know the domain you want to look up - otherwise how would they be able to look it up?

Still it would fulfill the OP’s wish: He wants to hide traffic from his ISP, so if he chooses a DNS resolver other than his ISP, and encrypt transmission, goal is achieved.