this post was submitted on 24 Feb 2025
32 points (100.0% liked)

Privacy

800 readers
55 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

much thanks to @gary_host_laptop for the logo design :)

founded 5 years ago
MODERATORS
 

I kinda don't trust my home network because my brother is douche and I feel like he's gonna do some weird things with the connection, so I prefer to juse use my phone's data (unlimited data plan) to avoid any shenanigans. Hypothetically, how much harm can an evil wifi do?

Does using HTTPS avoid all risks? What about evey program on your computer or every app on your phone, do they also have HTTPS everywhere on? (I use Android btw)

How much could a VPN do better that HTTPS cant?

top 10 comments
sorted by: hot top controversial new old
[–] hemko@lemmy.dbzer0.com 24 points 1 week ago (1 children)

As others have mentioned, DNS is probably your worst enemy. It doesn't take much technical knowledge to just create a DNS server and start logging all domains you're accessing. Say, to tell mom how often you're browsing porn or something.

Manually configuring DNS servers in your OS would resolve this issue, but also using VPN like mullivad would just bypass such worries with 99% certainty.

Or just keep using mobile data, because why not

[–] Flagstaff@programming.dev 5 points 1 week ago (1 children)

Or just keep using mobile data

That merely moves it to the carrier knowing, though, right?

[–] hemko@lemmy.dbzer0.com 2 points 1 week ago

Nope, but OP mentioned in the post that they're sketched off from their brother who's in control of the home network

[–] cmgvd3lw@discuss.tchncs.de 7 points 1 week ago* (last edited 1 week ago) (1 children)

HTTPS encrypts traffic making it hard for packet sniffers to know what is being transferred. If you are using unsecured WiFi, there is a chance of DNS manipulation like, switching domain names etc. If you're using VPN, you hide your identity (IP) from the websites you visit and also if its configured to use their own DNS server, you can somewhat eliminate the DNS manipulation.

Anyways if you're not sure, try to use a VPN and HTTPS everywhere and use firewall to lock down all your exposed ports. I don't know how to configure firewall for port lockdown in android, but Rethink DNS (check Fdroid) is kind of helpful here.

[–] Xanza@lemm.ee 2 points 1 week ago (1 children)

but Rethink DNS (check Fdroid) is kind of a helpful here.

Correct. Rethink DNS covers private DNS, VPN connections, and firewall for android.

[–] cmgvd3lw@discuss.tchncs.de 2 points 1 week ago (1 children)

Rethink does not have built in vpn, but can use wireguard config

[–] Xanza@lemm.ee 1 points 1 week ago

Yes, this is what I've said.

[–] Telorand@reddthat.com 5 points 1 week ago

I think there's some fundamental misunderstandings about what each technology does.

  • HTTPS encrypts the data you send to each website. However, there's no guarantee a website will respect that setting (though they often do) and it may or may not include ancillary data and trackers from third party JavaScript; if there's an issue, your browser may fallback to HTTP mode. DNS requests will almost always be unencrypted, so each gateway between you and the website can at least see where your IP address went.
  • VPNs essentially act as a proxy for your internet browsing. What that means is that anyone who could sniff your traffic can see that you established an encrypted tunnel to the VPN IP, but they would have to be able to track that second IP address to see where you were going. Each gateway operator between you and the VPN can only see that you connected to the VPN, and the VPN will forward all traffic requests you made back to you via an encrypted tunnel. Good VPNs will also send your DNS requests to their servers, so all anyone can see is that your connection is wholly tied to the VPN.

In your case, your brother could mess with the DNS on the router to send you wherever he wants when you type in google.com, he could set up a hosts file to block you from going to specific sites or IP addresses, or he could manipulate any unencrypted data packets you receive.

Using your phone internet just puts your privacy in the hands of your phone's network operator instead. How much do you trust them not to rat you out?

If you want anonymity or ways to get around blocks, you need to use a logless VPN at minimum or something like Tor, depending on your needs.

[–] furrowsofar 2 points 1 week ago* (last edited 1 week ago)

Kind of depends. The one thing that an untrusted network may be able to do is adjust routing tables. Some systems and some VPNs may be protected from this, some may not. At least the https connections should be secure but where you're connecting can be trracked. DNS is vunerable too unless you set your browser system to use a secure connection to DNS server you trust.

[–] catloaf@lemm.ee 2 points 1 week ago

The HTTPS everywhere extension only covers the browser. Other applications might be vulnerable. If he controls the network, he could hijack your DNS and intercept all other connections. He could also use a downgrade attack to force an insecure version of TLS and compromise that.

But that's extremely unlikely, unless he's either a skilled attacker or can use tools like metasploit.