1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

Does my ISP know what I download IF

Discussion in 'Proxies' started by JohnnyMantus, Jan 8, 2012.

  1. JohnnyMantus

    JohnnyMantus Registered Member

    Joined:
    Dec 10, 2011
    Messages:
    69
    Likes Received:
    9
    Occupation:
    FA-18 Super Hornet Pilot
    Location:
    The Other Side
    I am using Tor?

    I am sure they see it coming through (not sure how to say it)
    but they can't tell it's coming from my exact location right?

    Thank you,
    John
     
  2. Articlewriter2012

    Articlewriter2012 Registered Member

    Joined:
    Jan 19, 2012
    Messages:
    55
    Likes Received:
    1
    Location:
    Canada
    It is through Tor, then I dont think so. Did you ask any technical experts on this issue??
     
  3. nickk

    nickk BANNED BANNED

    Joined:
    Feb 1, 2009
    Messages:
    616
    Likes Received:
    262
    ISP can monitor both in/out traffic.
    In from tor until your pc and out from your pc until tor.
     
  4. popzzz

    popzzz Supreme Member

    Joined:
    Apr 12, 2009
    Messages:
    1,337
    Likes Received:
    13,699
    Location:
    Don't touch the REP!

    Yes - your ISP can see. You are on their subnet.

    You have to go through them to even get to proxies ..... :yield:

    If you are registered with them properly they know exactly where you are.

    Enjoy ..... :cool2:


     
    Last edited: Jan 26, 2012
  5. Tensegrity

    Tensegrity Jr. VIP Jr. VIP Premium Member

    Joined:
    Apr 22, 2009
    Messages:
    1,824
    Likes Received:
    969
    I would say you are safe.

    At face value, an ISP cannot sniff packets properly if you are going through Tor because it is encrypted with onion technology. When you connect to the Tor network, it works like this:

    - you make a request to a website in your Tor-enabled browser
    - that request is encrypted three times and sent from your computer to the ISP and then to the first server in a long chain of servers (usually 15-20 or more)
    - the ISP only sees encrypted packets (they cannot read) sent to and from that first server in the network which is a relay server and not hosting any content to see (besides encrypted packets)
    - as the packets are sent to each server, a layer of encryption is removed and another added and the last three servers remove the encryption entirely (one by one) so that in the end, the last server can see only as far back as the previous server.

    However, you should avoid logging into any personal accounts through Tor since anything you connect to can all be seen by the exit node and it would completely disrupt the whole purpose of using Tor. Additionally, an exit node can track patterns and could ostensibly figure out who you are if you are a heavy user of the same node, so it's good to constantly change "identities".
     
    • Thanks Thanks x 1
  6. JohnnyMantus

    JohnnyMantus Registered Member

    Joined:
    Dec 10, 2011
    Messages:
    69
    Likes Received:
    9
    Occupation:
    FA-18 Super Hornet Pilot
    Location:
    The Other Side
    Got ya .. thanks

    John

    OK, I get most of that ..

    I did log into my safe-mail account a few times
    in Tor, so I will change password now ..

    Very good to know ..

    Thank you,
    John
     
  7. jazzc

    jazzc Moderator Staff Member Moderator Jr. VIP

    Joined:
    Jan 27, 2009
    Messages:
    2,468
    Likes Received:
    10,148
    Your ISP can't see your traffic if you use any kind of encryption.

    Good choices are:
    • VPN
    • SSH Tunneling
     
    • Thanks Thanks x 1
  8. popzzz

    popzzz Supreme Member

    Joined:
    Apr 12, 2009
    Messages:
    1,337
    Likes Received:
    13,699
    Location:
    Don't touch the REP!

    Your ISP/carrier can ALWAYS 'see' your traffic. :yield:

    Just because they cannot 'read' encrypted traffic does NOT mean they cannot see it.

    Encryption makes the data not readily readable - it does NOT make it invisible.

    IP numbers (identifying to/from) and port numbers (identifying type of data) are ALWAYS in the clear and readable.

    For encrypted traffic, the only things your ISP/carrier can see is:
    • encrypted (unreadable/useless) data
    • what ports you're using
    • how much traffic you use (bandwidth)
    • IP connected to
    • time of connect/disconnect
    Using VPN and/or SSN tunneling cuts down your exposure to your ISP/carrier but OPENS new exposure to your VPN/tunneling provider and their ISP/carrier.

    When using a VPN/tunnel the only thing your ISP/carrier will see is that you connected to the IP number of the service at XXXX time/date and that you disconnected from their service at time/date and the traffic (bandwidth) generated and the port connected to.

    The data/DNS goes through the VPN/tunnel to the other end through your service provider and through their ISP on out to the internet.

    Enjoy ..... :cool2:



     
  9. jazzc

    jazzc Moderator Staff Member Moderator Jr. VIP

    Joined:
    Jan 27, 2009
    Messages:
    2,468
    Likes Received:
    10,148
    @popzzz

    You are say exactly what I am saying...

    The ISP cannot see your traffic when you use a VPN/SSH Tunnel, in the sense that they cannot identify
    • What you visit
    • What data you exchange.

    Sure they can see that there is traffic passing through from you to the other node of the tunnel, but it 's useless for tracking anything. They can tell you connected 3 hours a day to your private tunnel but they can't tell is you visited Bing or not. I 'm sure no one actually cares to hide from his ISP how many hours a day he uses the Internet :D And even if you do want that, you can always create junk traffic to flow 24/7.

    DNS traffic can be routed through the tunnels since the end node will be responsible for the resolving of domain names to ips. This way, the ISP does not get even that info.
     
  10. popzzz

    popzzz Supreme Member

    Joined:
    Apr 12, 2009
    Messages:
    1,337
    Likes Received:
    13,699
    Location:
    Don't touch the REP!

    Right.

    What should also be noted is that you are moving your exposure from one end of the pipe to the other so depending on what you are doing caution should be exercised even using a tunnel. :thumb:

    Enjoy ..... :cool2:



     
    • Thanks Thanks x 1
  11. amordeaa

    amordeaa Newbie

    Joined:
    Jan 20, 2012
    Messages:
    14
    Likes Received:
    2
    they can see everything if they wish. Think of your ISP as the gateway that takes you to the cloud "internet". now they dont monitor every one because it's too much work of course but dependng on their security level they can have certain FLAGS when certain services are used. using proxy does not help ,,,you are still being routed through them
     
  12. knightrider179

    knightrider179 Newbie

    Joined:
    Feb 3, 2012
    Messages:
    11
    Likes Received:
    0
    If you are outside of their network (e.g you connect to vps server), they would not be able to know what you would be doing. Apart from this, they will still know what you are doing as you are on their network. Hope this helps.
     
  13. popzzz

    popzzz Supreme Member

    Joined:
    Apr 12, 2009
    Messages:
    1,337
    Likes Received:
    13,699
    Location:
    Don't touch the REP!

    You go through their network to get to and back from the VPS. :yield:

    Enjoy ..... :cool2: