Man Found Guilty of Child Porn, Because He Ran a Tor Exit Node::undefined

  • Jamie@jamie.moe
    link
    fedilink
    English
    arrow-up
    12
    ·
    1 year ago

    The high majority of websites are HTTPS, which means that the contents of requests are end to end encrypted. Technically if it’s just HTTP, it’s plaintext, but basically no sites operate outside of HTTPS anymore.

    All that stuff about everything you do being in the clear is outdated, and basically just VPN propaganda. The only parts of typical web browsing that aren’t encrypted are DNS resolutions, but DoH and encrypted DNS are starting to be a thing. In which case, your ISP/gov will know you’re accessing your bank’s site, but not what you’re doing on there because everything else is encrypted.

    Tl;Dr: Everything being plaintext is really outdated and is basically VPN propaganda. The majority of network traffic for most users is end to end encrypted already.

    • HousePanther@lemmy.goblackcat.com
      link
      fedilink
      English
      arrow-up
      9
      ·
      1 year ago

      That is not completely true. Often the payload is encrypted but not the metadata. It is the metadata that usually is the cause of privacy issues.

      • Jamie@jamie.moe
        link
        fedilink
        English
        arrow-up
        5
        arrow-down
        1
        ·
        1 year ago

        I think you might misunderstand what metadata is. The type of metadata you might be referring to are simply tracking methods employed on webpages by the likes of Facebook, Google, and other advertisers. But those are encrypted as well, they’re not open to view by anyone in the middle because they also utilize HTTPS. The vulnerability they pose is the potential for that data to be given up, or subpoenaed on the database end. There is no magic unencrypted data sent when dealing with accessing a website except, as mentioned, possibly the DNS query, which can be easily encrypted via DoH.

        Except, VPNs and Tor aren’t even magic bullets for privacy. The moment you log into a service, you lose your veil of privacy if your activities can be reasonably linked. To really remain private, you would need to use Tor Browser, likely over a VPN, preferably on a live booted system like Tails, and forego any usage of JavaScript or account logins. Doing anything different exposes you to tracking methods. Which removes you from using the majority of the Internet.