ISPs can sell your browsing history without your consent, Senate rules
-
http://www.notebookcheck.net/ISPs-can-sell-your-browsing-history-without-your-consent-Senate-rules.209092.0.html
bah... what do you think about? -
-
Encrypt all the things. They can know the sites I hit, but nothing else.
Also why @scottalanmiller needs to fixed the mixed encryption message here one of these day.
-
@JaredBusch said in ISPs can sell your browsing history without your consent, Senate rules:
Also why @scottalanmiller needs to fixed the mixed encryption message here one of these day.
That's going to be quite difficult without hosting any images posted locally or in some sort of known central repository, and, frankly, f that.
-
I've never been big on the whole "VPN" subscription thing, but this may make me consider it. I'm already paying my ISP (AT&T) $60 /month for service...now you're going to sell my browsing history and make even more money off me. I doubt service would improve and/or become less expensive...
-
@anthonyh said in ISPs can sell your browsing history without your consent, Senate rules:
I've never been big on the whole "VPN" subscription thing, but this may make me consider it. I'm already paying my ISP (AT&T) $60 /month for service...now you're going to sell my browsing history and make even more money off me. I doubt service would improve and/or become less expensive...
I always have one browser that uses the TOR proxy. Combine that with private browsing.... better (I still doubt 100% privacy, as we know government runs TOR exit nodes.)
-
@travisdh1 I may have to check that out. Though, I think if I was do something to "anonamize" (sp?) my browsing history I'd want to do it at the network level so my family is included. I'll have to look into Tor and/or VPN routers and see what's out there.
-
@anthonyh said in ISPs can sell your browsing history without your consent, Senate rules:
@travisdh1 I may have to check that out. Though, I think if I was do something to "anonamize" (sp?) my browsing history I'd want to do it at the network level so my family is included. I'll have to look into Tor and/or VPN routers and see what's out there.
Well, the reason I only have it setup for a single browser is because of the nature of the TOR network, it moves like molasses in the middle of winter compared to the regular internet connection. If you want a VPN that's not going to slow things down, just pay a provider $5/month.
-
Tor
-
VPN somewhere else (such as @scottalanmiller's computer) and then TOR.
-
I just assumed this was already occurring. While using Tor to reduce the likelyhood of being "known" helps, Tor is painfully slow, and a lot of the features you want the internet for, are completely non-functional. Granted this is because these services aren't built for privacy, but still.
-
It becomes a question of what is important: "enough" anonymity or functionality. Personal choice.
-
@wirestyle22 said in ISPs can sell your browsing history without your consent, Senate rules:
It becomes a question of what is important: "enough" anonymity or functionality. Personal choice.
Yep. Which is why I typically have a single browser configured to use it instead of whole systems or networks.
-
Just spin up a cheap VM and use a dynamic SSH tunnel. Then destroy the VM when you're done.
-
@stacksofplates said in ISPs can sell your browsing history without your consent, Senate rules:
Just spin up a cheap VM and use a dynamic SSH tunnel. Then destroy the VM when you're done.
Automate that with Ansible and you can have a system of rapidly moving VPN servers on top of everything else! Add a CloudFlare script and you can automate it to set up and destroy and configure DNS every day automatically if you want for a truly difficult to track system. Add Terraform and you could have it randomly pick a different datacenter every day!
-
@scottalanmiller said in ISPs can sell your browsing history without your consent, Senate rules:
@stacksofplates said in ISPs can sell your browsing history without your consent, Senate rules:
Just spin up a cheap VM and use a dynamic SSH tunnel. Then destroy the VM when you're done.
Automate that with Ansible and you can have a system of rapidly moving VPN servers on top of everything else! Add a CloudFlare script and you can automate it to set up and destroy and configure DNS every day automatically if you want for a truly difficult to track system. Add Terraform and you could have it randomly pick a different datacenter every day!
Write up a guide, would you Don't skip any steps in between.
-
@stacksofplates said in ISPs can sell your browsing history without your consent, Senate rules:
Just spin up a cheap VM and use a dynamic SSH tunnel. Then destroy the VM when you're done.
One of the reasons why I went with Qubes was for privacy. Spin up a disposable VM script, do what needs to be done, and then close it to shutdown the vm and all of the evidence is gone.
-
@NerdyDad said in ISPs can sell your browsing history without your consent, Senate rules:
@stacksofplates said in ISPs can sell your browsing history without your consent, Senate rules:
Just spin up a cheap VM and use a dynamic SSH tunnel. Then destroy the VM when you're done.
One of the reasons why I went with Qubes was for privacy. Spin up a disposable VM script, do what needs to be done, and then close it to shutdown the vm and all of the evidence is gone.
You are mixing use cases which makes it a little hard. Qubes has one purpose, running a lab is another.
But why not just use KVM, spin up a VM and revert it when done? Same privacy.
-
@scottalanmiller Until they subpoena Cloudflare (or any other provider).
-
@scottalanmiller said in ISPs can sell your browsing history without your consent, Senate rules:
@NerdyDad said in ISPs can sell your browsing history without your consent, Senate rules:
@stacksofplates said in ISPs can sell your browsing history without your consent, Senate rules:
Just spin up a cheap VM and use a dynamic SSH tunnel. Then destroy the VM when you're done.
One of the reasons why I went with Qubes was for privacy. Spin up a disposable VM script, do what needs to be done, and then close it to shutdown the vm and all of the evidence is gone.
You are mixing use cases which makes it a little hard. Qubes has one purpose, running a lab is another.
But why not just use KVM, spin up a VM and revert it when done? Same privacy.
You're right there. My original intent was to use it to learn CentOS and other linux server distros. I assumed that, since Qubes was built from Xen, that it should adaquetly support CentOS, but was wrong on that point. However, I have been liking it for a daily Linux driver for its built-in fail safes.