@[email protected] to [email protected] • 3 years agoWhy not use DNS over HTTPS (DoH)?www.bsdhowto.chmessage-square7fedilinkarrow-up114arrow-down10
arrow-up114arrow-down1external-linkWhy not use DNS over HTTPS (DoH)?www.bsdhowto.ch@[email protected] to [email protected] • 3 years agomessage-square7fedilink
minus-square@[email protected]linkfedilink2•edit-23 years ago DoH is not about protecting your DNS queries from peepers. That is a big lie. Reminder: if you don’t protect your HTTP[S] traffic using Tor and TorBrowser, your privacy is still compromised. For a nosy Internet Provider is very easy to correlate the IP addresses your browser connects to with the most popular websites and services. (Not to mention browser fingerprintinting and tracking done by 3rd parties)
minus-square@[email protected]linkfedilink1•3 years agoSNI easily gets uncovered with even the most rudimentary DPI I would think.
minus-square@[email protected]linkfedilink1•3 years agoYes and also, even with ESNI or domain fronting in use, the IP addresses are still a dead giveway. There’s no protection from that.
minus-square@[email protected]linkfedilink0•edit-23 years agoTrue, though looking at my tcpdump tor/i2p nodes generate a lot of fake interactions. unless you connect to snapcraft.io or like that every 15 minutes you aren’t that obvious.
Reminder: if you don’t protect your HTTP[S] traffic using Tor and TorBrowser, your privacy is still compromised.
For a nosy Internet Provider is very easy to correlate the IP addresses your browser connects to with the most popular websites and services.
(Not to mention browser fingerprintinting and tracking done by 3rd parties)
SNI easily gets uncovered with even the most rudimentary DPI I would think.
Yes and also, even with ESNI or domain fronting in use, the IP addresses are still a dead giveway. There’s no protection from that.
True, though looking at my tcpdump tor/i2p nodes generate a lot of fake interactions. unless you connect to snapcraft.io or like that every 15 minutes you aren’t that obvious.