How easy can my ISP know?

Discussion in 'privacy problems' started by titing3000, Sep 13, 2006.

Thread Status:
Not open for further replies.
  1. Brinn

    Brinn Registered Member

    Joined:
    Aug 5, 2004
    Posts:
    181
    Location:
    Canada
    It might work in court but your ISP might not care who's looking up what, only that it's coming from your computer. Also, your ISP might not appreciate you farming out your bandwidth like that (even if it's for a good cause). Right now, I'm contributing 200megs/day to Tor. I'm ramping that up slowly. Eventually, I'd reach my soft limit on monthly bandwidth and my ISP will contact me.

    I'm trying to find the balance point: Soft limit minus my personal usage equals bandwidth contributed to Tor. :D
     
  2. dog

    dog Guest

    Move over to Sympatico -- They've never complained about Bandwidth usage. ;) I'm a heavy user taking from my experience. :ninja:
     
  3. Climenole

    Climenole Look 'n' Stop Expert

    Joined:
    Jun 3, 2005
    Posts:
    1,637
    Hi Dog :)

    Good news !

    Anyway I have an unlimited bandwith usage with them.

    Thanks for this information.

    :)
     
  4. JinxGenius

    JinxGenius Registered Member

    Joined:
    Sep 23, 2006
    Posts:
    13
    Location:
    Internet
    hey hum.....
    I have a suggestion.....

    It's ISP that know what the hell you doing right?

    Here the deal:

    After you connected. Use VPN tunneling with encryption program to do all the connections. Thus the VPN server is like a ISP, but hosting it underground and "Private", with the 128bit encryption, I don't think it's "that easy" to see **** you doing......

    By the way, you can use the "Windows Internet Connection Settings" to link up all those VPN together, so, it can goes "all and massive connection run underground".... runnign on port 8080..... hehehehe

    this had been done by a Japanese already, although they make it a Japanese Commercial Program now, I still have a English very first version they released, and it sure work, all it need is "man power", with that, no one can "sniff" whatever we are doing for real.

    P.S. Thus I believe that the program could have intergraded the BT technology, and it'll be great.
     
  5. Paranoid2000

    Paranoid2000 Registered Member

    Joined:
    May 2, 2004
    Posts:
    2,839
    Location:
    North West, United Kingdom
    The ISP supplying the connection for the VPN server can see what sites are being accessed and since you'd be the only user, it would be easy for them (or other interested parties) to identify the source of your encrypted connections. This method is only useful therefore for avoiding casual observation by your "home" ISP (and is, BTW, on a par with most commercial anonymity services).

    With Tor, your encrypted connection is sent via 3 relays before being decrypted and each relay has incoming connections from other users as well - making it far harder to match (encrypted) incoming and (clear) outgoing connections, even for someone with the ability to monitor significant portions of the Internet.
     
  6. JinxGenius

    JinxGenius Registered Member

    Joined:
    Sep 23, 2006
    Posts:
    13
    Location:
    Internet
    no, although I'm the server, I basically provide the list of IPs that connects to me, for any connection, the packets itself will determine the shortest route, right?

    then every packets will fine it's own way but not only connect through me, otherwise I'll call myself a proxy, not VPN-ISP, so the packet can leave the VPN from anyone to the destination, and most likely they might properly get cut into around 3~5 pieces(that I mostly found for least ones), only 1 piece is missing and it'll gonna take them real good time to reverse that part.

    by the way, I dont expect that "VPN" will only have myself as an user also....
     
  7. Paranoid2000

    Paranoid2000 Registered Member

    Joined:
    May 2, 2004
    Posts:
    2,839
    Location:
    North West, United Kingdom
    Aside from not being able to understand half of what you are saying, the only conclusion I can draw is that you are unfamiliar with how Internet Protocol works.

    If you send encrypted data via a VPN to another server, the ISP providing the connections for that server will see data coming in and will know where it came from (since every packet will have its source IP address included). The ISP will see non-encrypted connections going out and will be able to link the non-encrypted and encrypted connections together quite easily (via network analysis) unless you were sharing with hundreds of other users (of course, you would have to persuade such users that you were a trustworthy guardian of their anonymity first - not an easy task).

    How packets are routed and whether they are fragmented or not, won't make the least amount of difference.
     
  8. Genady Prishnikov

    Genady Prishnikov Registered Member

    Joined:
    Mar 9, 2006
    Posts:
    350
    Paranoid, You seem to be saying that your ISP can see what sites you are connecting to even though you are using a VPN. This is not so. Once the encrypted connection between my PC and my VPN server has been made, all communications are hidden from the ISP. They only see the initial connection to the VPN server.

    In regular browsing, without VPN, your ISP can see all connections to an ssl-protected site, but cannot see what is taking place during the encrypted session. Is that what you are talking about? Because using VPN, they cannot see anything but the initial connection to the VPN server and nothing else as the VPN receives and sends all packets on your behalf and routes them to your PC via the encrypted connection. Maybe I misunderstood you, or your post wasn't clear as I think you already know this.

    On edit: Paranoid, It's late here. I see now that you made the distinction between the ISP "providing the VPN connection" and the "home ISP". Sorry. But maybe my post will help others still confused by the whole VPN thing.
     
  9. JinxGenius

    JinxGenius Registered Member

    Joined:
    Sep 23, 2006
    Posts:
    13
    Location:
    Internet
    Genady, thanks for speaking out those points that I missed,

    even with like 5~10 people, once I controlled my own VPN Service, the program will only use port 8080 to transfer data encrypted behind the tunnel,

    yes, the ISP may still see who is connected to me, but can only assume I have a http server since I basically masked everything under it.

    They can't see what you transfer but only where you connected to, just another peer, ain't that enough, and hell they know what you've been doing.

    yes, although they can record all the encrypted packages, with 128bit encryptions, how long do you think they will need to grauntee a full recover of the info.

    And I'm say, making a VPN not provide from ISP but using a 3rd party program, not Windows neither.
     
  10. Paranoid2000

    Paranoid2000 Registered Member

    Joined:
    May 2, 2004
    Posts:
    2,839
    Location:
    North West, United Kingdom
    That's correct - it's the ISP for the VPN server that will be able to determine which sites are being accessed by whom (with a little network analysis).
     
  11. JinxGenius

    JinxGenius Registered Member

    Joined:
    Sep 23, 2006
    Posts:
    13
    Location:
    Internet
    as far as your request are not send direct from you through your ISP to the site, the problem "you think your ISP is spying on you" is taken care, because he'd only communicate with another peer encrypted,

    no matter your commmunication is "recorded and analysted", it's encrypted anyway.
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.