joaojeronimo

joined 1 year ago
[–] [email protected] 1 points 1 year ago (1 children)

But how easy is it to actually make up what's going through a socket? If my ISP sees 1TB of data being continuously downloaded (from another IP address that they don't already know what its usually involved with) maybe I'm downloading some illegal movies, maybe I'm retrieving a hard drive backup, right?

Torrent traffic that doesn't go through a VPN is probably easy to make up, it's tons of packets from 50+ addresses, but if it's a Usenet download from one address, or SSH traffic from a seedbox, that should be more complicated to figure out right?

[–] [email protected] 1 points 1 year ago (1 children)

But so does TLS right?

[–] [email protected] 1 points 1 year ago

Well I was mostly thinking about Usenet but I guess everything else applies. Websites really can leak everything.

 

I was wondering if a VPN would add any kind of security or privacy if one is connecting to a host with a client/browser that supports DNS over HTTPS and that host supports encrypted client hello. Is there a way for the ISP or anything in between to shape traffic or even know what is being accessed? The only thing that should be visible is traffic between two IP addresses right?

[–] [email protected] 9 points 1 year ago (5 children)

Are there any dumb TVs with good panels and HDMI CEC for sale? That would be perfect to use with an Nvidia shield or apple TV or equivalent..

[–] [email protected] 5 points 1 year ago

That's a double blow to the activists tomorrow they'll be protesting the use of fossil fuels AND the waste of fresh water in cannons