Noob here. This is probably the most repeated question, but I don’t know the technical terms to make the appropiate digging online, and thought of asking humans before slopping my way around.

I don’t trust my ISP or the government above it.

The ISP remotely manages the local network! So I installed a router of my own and my devices only to that one.

I would like to encrypt (?) anything that goes out of my own router, so my ISP doesn’t evesdrop what I’m doing even if they want to (I know I know… if they really wanted, they could just send friends to my house).

Using Linux, Android GOS, and Pihole. They live under a “picked-up-from-a-shelf” router; and that router under theirs.

(I cannot get a different ISP)

Thanks

  • ki9@lemmy.gf4.pw
    link
    fedilink
    English
    arrow-up
    0
    ·
    edit-2
    1 day ago

    VPN is the answer but keep in mind that you’re just moving the trust to the VPN (they can see your traffic).

    The web uses a request/response architecture. Your computer requests a cat pic from the server and the server sends a cat pic back. Your real IP address must be in the request… otherwise the response cannot be routed back to you. VPNs act like couriers making requests and receiving responses on your behalf. So:

    • The cat pic server sees traffic coming from the VPN provider and doesnt know who you are.
    • The ISP sees encrypted traffic to the VPN but doesn’t know what it is.
    • The VPN sees everything.

    Most web traffic is already encrypted with TLS but not the domain names and IPs (needed for routing).

    If you really want to be anonymous on the web, use tor, but it’s slow and many websites block tor exit nodes so you will have a degraded experience.

    • certified_expert@lemmy.worldOP
      link
      fedilink
      arrow-up
      0
      ·
      1 day ago

      If I use VPN, my isp will see that I send and receive gibblish to and from a single address (the vpn server), all over port 443, right?

      If I use TOR, what does my ISP see?

      • ki9@lemmy.gf4.pw
        link
        fedilink
        English
        arrow-up
        0
        ·
        6 hours ago

        Itll go over a different port depending on the vpn protocol (i recommend wireguard). So the isp will know it’s vpn gibberish, but there are ways to tunnel the ciphertext through https again (like wstunnel). A bit overkill for your setup but comes in handy if you need to break through firewalls (if you are in china and wireguard ports are blocked but 443 is allowed)

        If you use tor, your isp sees tor traffic (gibberish) but tor also supports obfuscation to make it look like http. All you need to use tor is tor browser (mobile apps exist too) so try it out… It’s free but you will see the limitations I mentioned.

      • SitD@lemy.lol
        link
        fedilink
        arrow-up
        0
        ·
        21 hours ago
        1. yes
        2. the same, but probably to an even more unknown IP that is also changing frequently. the content itself should look equally random