If I delete my router's history can my ISP still provide it to my parents?If I use a VPN, who will resolve my...

Connecting top and bottom of adjacent circles

When does coming up with an idea constitute sufficient contribution for authorship?

Numbers of Exaggeration in Talmud

Why didn't Eru and/or the Valar intervene when Sauron corrupted Númenor?

The terminology for an excluded solution

Finding the number of integers that are a square and a cube at the same time

What is better: yes / no radio, or simple checkbox?

Does Windows 10's telemetry include sending *.doc files if Word crashed?

How would an AI self awareness kill switch work?

How to avoid being sexist when trying to employ someone to function in a very sexist environment?

How can I improve my fireworks photography?

Could be quantum mechanics necessary to analyze some biology scenarios?

Math reviews in "Zentralblatt für Mathematik und ihre Grenzgebiete"

I am on the US no-fly list. What can I do in order to be allowed on flights which go through US airspace?

Dilemma of explaining to interviewer that he is the reason for declining second interview

Meaning of ご休憩一時間コース

How to approximate rolls for potions of healing using only d6's?

Discrepancy in P/E ratio of stocks in Robinhood app?

Why did Bush enact a completely different foreign policy to that which he espoused during the 2000 Presidential election campaign?

How to acknowledge an embarrassing job interview, now that I work directly with the interviewer?

What kind of hardware implements Fourier transform?

Which preposition to use with beauty? Of or with?

Why is c4 a better move in this position?

How to properly claim credit for peer review?



If I delete my router's history can my ISP still provide it to my parents?


If I use a VPN, who will resolve my DNS requests?Will an ISP give out network/traffic info upon request?How can mom monitor my internet history from a distance?My ISP uses deep packet inspection; what can they observe?Hiding or Obscuring Data from ISPsHow can Chromium access my Firefox history?Can my isp see what I legitimately download?Can my ISP provide my parents with what sites I visit?can a malware conceal true browser historyDoes your ISP know your router's name?Can VPN prevent ISP from tracking?How can a router or my ISP protect against phishing?













49















If I delete my router's history, is it still visible and can my ISP still provide it to my parents?
Or is it deleted from existence?










share|improve this question









New contributor




madur is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.
















  • 12





    If you're that worried, employ incognito mode, only use DuckDuckGo (or similar) as your search engine and always browse using a VPN.

    – NeepNeepNeep
    Feb 27 at 15:09






  • 79





    Are there consumer-grade routers that store any history by default?

    – JPhi1618
    Feb 27 at 18:11






  • 17





    @NeepNeepNeep "If you're that worried, employ incognito mode, only use DuckDuckGo (or similar) as your search engine and always browse using a VPN"... none of which helps him out. The OP asked at the ISP. The ISP would still have that info... and even the VPN only helps to a point -- because DNS requests are still exposed.

    – MGoBlue93
    Feb 27 at 23:31








  • 59





    @MGoBlue93 That is incorrect. A properly configured VPN for privacy from your ISP will not expose DNS requests. Everything, including DNS, goes through the VPN.

    – forest
    Feb 28 at 2:12






  • 22





    @MGoBlue93 "A or not A" are two binary choices. Forest specified a properly configured VPN for their answer, your comment says a VPN can only help to a point. Sure, there are infinite ways to not properly configure a VPN and thousands of VPNs that don't provide automatic proper configurations, but if the VPN is properly configured, then DNS requests are not exposed. Also, Forest did not attack you, they pointed out an error. Attacking is what you are doing by directing an insult at Forest (calling that person uneducated), and claiming they are attacking you.

    – Davy M
    Feb 28 at 18:18
















49















If I delete my router's history, is it still visible and can my ISP still provide it to my parents?
Or is it deleted from existence?










share|improve this question









New contributor




madur is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.
















  • 12





    If you're that worried, employ incognito mode, only use DuckDuckGo (or similar) as your search engine and always browse using a VPN.

    – NeepNeepNeep
    Feb 27 at 15:09






  • 79





    Are there consumer-grade routers that store any history by default?

    – JPhi1618
    Feb 27 at 18:11






  • 17





    @NeepNeepNeep "If you're that worried, employ incognito mode, only use DuckDuckGo (or similar) as your search engine and always browse using a VPN"... none of which helps him out. The OP asked at the ISP. The ISP would still have that info... and even the VPN only helps to a point -- because DNS requests are still exposed.

    – MGoBlue93
    Feb 27 at 23:31








  • 59





    @MGoBlue93 That is incorrect. A properly configured VPN for privacy from your ISP will not expose DNS requests. Everything, including DNS, goes through the VPN.

    – forest
    Feb 28 at 2:12






  • 22





    @MGoBlue93 "A or not A" are two binary choices. Forest specified a properly configured VPN for their answer, your comment says a VPN can only help to a point. Sure, there are infinite ways to not properly configure a VPN and thousands of VPNs that don't provide automatic proper configurations, but if the VPN is properly configured, then DNS requests are not exposed. Also, Forest did not attack you, they pointed out an error. Attacking is what you are doing by directing an insult at Forest (calling that person uneducated), and claiming they are attacking you.

    – Davy M
    Feb 28 at 18:18














49












49








49


16






If I delete my router's history, is it still visible and can my ISP still provide it to my parents?
Or is it deleted from existence?










share|improve this question









New contributor




madur is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.












If I delete my router's history, is it still visible and can my ISP still provide it to my parents?
Or is it deleted from existence?







privacy router isp






share|improve this question









New contributor




madur is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.











share|improve this question









New contributor




madur is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.









share|improve this question




share|improve this question








edited Feb 27 at 15:13









Glorfindel

1,1812821




1,1812821






New contributor




madur is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.









asked Feb 27 at 12:28









madurmadur

258123




258123




New contributor




madur is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.





New contributor





madur is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.






madur is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.








  • 12





    If you're that worried, employ incognito mode, only use DuckDuckGo (or similar) as your search engine and always browse using a VPN.

    – NeepNeepNeep
    Feb 27 at 15:09






  • 79





    Are there consumer-grade routers that store any history by default?

    – JPhi1618
    Feb 27 at 18:11






  • 17





    @NeepNeepNeep "If you're that worried, employ incognito mode, only use DuckDuckGo (or similar) as your search engine and always browse using a VPN"... none of which helps him out. The OP asked at the ISP. The ISP would still have that info... and even the VPN only helps to a point -- because DNS requests are still exposed.

    – MGoBlue93
    Feb 27 at 23:31








  • 59





    @MGoBlue93 That is incorrect. A properly configured VPN for privacy from your ISP will not expose DNS requests. Everything, including DNS, goes through the VPN.

    – forest
    Feb 28 at 2:12






  • 22





    @MGoBlue93 "A or not A" are two binary choices. Forest specified a properly configured VPN for their answer, your comment says a VPN can only help to a point. Sure, there are infinite ways to not properly configure a VPN and thousands of VPNs that don't provide automatic proper configurations, but if the VPN is properly configured, then DNS requests are not exposed. Also, Forest did not attack you, they pointed out an error. Attacking is what you are doing by directing an insult at Forest (calling that person uneducated), and claiming they are attacking you.

    – Davy M
    Feb 28 at 18:18














  • 12





    If you're that worried, employ incognito mode, only use DuckDuckGo (or similar) as your search engine and always browse using a VPN.

    – NeepNeepNeep
    Feb 27 at 15:09






  • 79





    Are there consumer-grade routers that store any history by default?

    – JPhi1618
    Feb 27 at 18:11






  • 17





    @NeepNeepNeep "If you're that worried, employ incognito mode, only use DuckDuckGo (or similar) as your search engine and always browse using a VPN"... none of which helps him out. The OP asked at the ISP. The ISP would still have that info... and even the VPN only helps to a point -- because DNS requests are still exposed.

    – MGoBlue93
    Feb 27 at 23:31








  • 59





    @MGoBlue93 That is incorrect. A properly configured VPN for privacy from your ISP will not expose DNS requests. Everything, including DNS, goes through the VPN.

    – forest
    Feb 28 at 2:12






  • 22





    @MGoBlue93 "A or not A" are two binary choices. Forest specified a properly configured VPN for their answer, your comment says a VPN can only help to a point. Sure, there are infinite ways to not properly configure a VPN and thousands of VPNs that don't provide automatic proper configurations, but if the VPN is properly configured, then DNS requests are not exposed. Also, Forest did not attack you, they pointed out an error. Attacking is what you are doing by directing an insult at Forest (calling that person uneducated), and claiming they are attacking you.

    – Davy M
    Feb 28 at 18:18








12




12





If you're that worried, employ incognito mode, only use DuckDuckGo (or similar) as your search engine and always browse using a VPN.

– NeepNeepNeep
Feb 27 at 15:09





If you're that worried, employ incognito mode, only use DuckDuckGo (or similar) as your search engine and always browse using a VPN.

– NeepNeepNeep
Feb 27 at 15:09




79




79





Are there consumer-grade routers that store any history by default?

– JPhi1618
Feb 27 at 18:11





Are there consumer-grade routers that store any history by default?

– JPhi1618
Feb 27 at 18:11




17




17





@NeepNeepNeep "If you're that worried, employ incognito mode, only use DuckDuckGo (or similar) as your search engine and always browse using a VPN"... none of which helps him out. The OP asked at the ISP. The ISP would still have that info... and even the VPN only helps to a point -- because DNS requests are still exposed.

– MGoBlue93
Feb 27 at 23:31







@NeepNeepNeep "If you're that worried, employ incognito mode, only use DuckDuckGo (or similar) as your search engine and always browse using a VPN"... none of which helps him out. The OP asked at the ISP. The ISP would still have that info... and even the VPN only helps to a point -- because DNS requests are still exposed.

– MGoBlue93
Feb 27 at 23:31






59




59





@MGoBlue93 That is incorrect. A properly configured VPN for privacy from your ISP will not expose DNS requests. Everything, including DNS, goes through the VPN.

– forest
Feb 28 at 2:12





@MGoBlue93 That is incorrect. A properly configured VPN for privacy from your ISP will not expose DNS requests. Everything, including DNS, goes through the VPN.

– forest
Feb 28 at 2:12




22




22





@MGoBlue93 "A or not A" are two binary choices. Forest specified a properly configured VPN for their answer, your comment says a VPN can only help to a point. Sure, there are infinite ways to not properly configure a VPN and thousands of VPNs that don't provide automatic proper configurations, but if the VPN is properly configured, then DNS requests are not exposed. Also, Forest did not attack you, they pointed out an error. Attacking is what you are doing by directing an insult at Forest (calling that person uneducated), and claiming they are attacking you.

– Davy M
Feb 28 at 18:18





@MGoBlue93 "A or not A" are two binary choices. Forest specified a properly configured VPN for their answer, your comment says a VPN can only help to a point. Sure, there are infinite ways to not properly configure a VPN and thousands of VPNs that don't provide automatic proper configurations, but if the VPN is properly configured, then DNS requests are not exposed. Also, Forest did not attack you, they pointed out an error. Attacking is what you are doing by directing an insult at Forest (calling that person uneducated), and claiming they are attacking you.

– Davy M
Feb 28 at 18:18










8 Answers
8






active

oldest

votes


















127















If I delete my router's history, is it still visible and can my ISP still provide it to my parents? Or is it deleted from existence?




Your ISP's record of your network usage isn't in any way affected by you doing anything to your router. You could wipe its memory, subject it to an EMP, and crush its chips to dust, and it wouldn't have any effect on them. :-) They maintain their own logs, which you cannot delete.



Whether your ISP will provide that information to your parents is another question, I expect it varies by locale/jurisdiction and possibly ISP.



You can make it (nearly) impossible for your ISP to know what sites you're visiting by using Tor or similar. The project includes Tor Browser, based on Firefox ESR, which makes it really easy to browse over Tor. You can also use the Brave browser (no affiliation), based on the Chromium project, in its "Private window with Tor" mode. This is not user-configuring a browser for Tor (which the Tor project advises against, it's too easy to miss out important things), it's a browser from privacy-obsessed people with a Tor-enabled private browsing mode. Both Tor Browser and Brave have trade-offs, see this tweet thread (in particular the replies from Tom Lowenthal, their Security & Privacy PM). Some people say "You should never browse with Tor with anything but Tor Browser" but it's more nuanced than that.






share|improve this answer










New contributor




T.J. Crowder is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.





















  • Comments are not for extended discussion; this conversation has been moved to chat.

    – Rory Alsop
    yesterday











  • Please note that Brave browser has vastly inferior fingerprinting resistance compared to Tor browser. While the mere use of Tor is sufficient to avoid ISP-level sniffing, the use of an alternate browser like Brave makes it possible for the websites you visit to uniquely identify your computer across visits.

    – forest
    14 hours ago











  • @forest - That discussion has already been moved to chat once. It's not useful to start it here again. Separately: You've been asked before for citations to back up your claims and still haven't provided any. Please do so (in the chat).

    – T.J. Crowder
    8 hours ago





















38














Routers usually do not store history and ISPs, while they may record such things on internal logs, do not give them out to anyone without a court order. You do not need to worry about your parents finding the naughty sites you visited unless it's in your browser history. Just turn on incognito mode and don't worry.



While it is theoretically possible that some ISPs may have a child-safe mode where they record and even report visited sites to the account holders, I have never heard of this happening. It would also be fraught with legal risks, so it is unlikely to be a realistic threat. If you are worried about that threat, you can use a VPN or Tor to encrypt the connection going through your ISP so they cannot log anything.






share|improve this answer





















  • 66





    I don’t think that’s a safe assumption. The ISP might turn over records of an account’s activity to the legitimate account holder without a court order.

    – John Deters
    Feb 27 at 15:52






  • 15





    If the OP's parents are the account holder it's perfectly reasonable for the ISP to give them log data, since it is their data.

    – NathanOliver
    Feb 27 at 17:21






  • 4





    @NathanOliver Wouldn't that depend on jurisdictions pretty heavily? I assume GDPR would cover that; but in other places, is there anything that actually suggests the data they legally collect about you is still "yours"?

    – JMac
    Feb 27 at 17:37






  • 3





    @JMac Why would the GDPR apply here? What websites were visited from an IP doesn't seem "personal data" and would certainly be covered by pseudonymisation no?

    – Voo
    Feb 27 at 18:56






  • 7





    @Voo I'm pretty sure that IP address plus date and time counts as personally identifiable data under the GDPR. Even if it doesn't actually, it's certainly borderline enough that any DPO worth their salt should advice strong caution.

    – a CVn
    Feb 27 at 21:17



















11














ISPs can absolutely log traffic upstream from your router.



The easiest way for an ISP to inspect what users are doing is by inspecting logged dns queries. People can get around this by using non ISP dns servers such as 1.1.1.1 (cloudflare dns) or 8.8.8.8 (google dns)



The next easiest is to actually log connections. To get around this, people use VPN or an onion router such as Tor. This causes the traffic to all go out over a single encrypted tunnel (or in the case of tor many encrypted tunnels) till it leaves the network owned by the snoopers. The Opera browser now includes free ephemeral VPN. If you wanted to build your own openvpn server in the cloud there are some setup scripts on github. If you live under a repressive government they will try to block or disrupt VPN traffic (note to representatives of repressive governments, privacy is necessary for information security and basic human dignity). In that case you may wish to explore shadowsocks.



Do be aware that most free VPN services fund their operation by monetizing your traffic data. This means they actively collect and actively sell your connection data. This might be preferable to being watched by people who know you, but do keep it in mind.



Opera VPN + cloudflare DNS should provide privacy ISP from account owners. Do be aware of local cached data (incognito mode is your friend here). Tor works too. Keep in mind that Tor traffic has a distinctive fingerprint. Network administrators who are interested in who might be doing illegal things can watch for that traffic. There was a report recently of a college student who sent a threatening email in order to delay an exam. The network administrators simply checked network logs for who on campus was using Tor during the minute the email was received and then said student received a knock, some new chrome bracelets and didn't have to worry about exams anymore.






share|improve this answer





















  • 1





    VPN traffic also has a pretty significant fingerprint, so if someone is logging DPI data they can just as easily look for signs of VPN traffic as for signs of Tor traffic. As for Tor, someone said (I think it was in a DEFCON presentation) that it is designed to make Tor users look alike, not make Tor users look like non-Tor users. Tor offers anonymity, not privacy or confidentiality (and if the baseband traffic is unencrypted and/or unauthenticated, it's actually probably easier to track people who are using Tor, and mess with their traffic, due to the relatively small number of exit nodes).

    – a CVn
    Feb 27 at 21:22













  • "VPN traffic also has a pretty significant fingerprint," Plus, DNS requests are NOT encrypted by the VPN... that's how Big Tech works around not having access to cookies and such; they infer data about you from lookups.

    – MGoBlue93
    Feb 27 at 23:35











  • Regarding previous comments. Absolutely, VPN traffic has a distinctive fingerprint. It often uses distinctive TCP or UDP ports (VPN comes in a handful of varieties). Even when it uses a common port such as 443 it has distinctive characteristics. We know this because the great firewall of china is able to block and/or degrade SSL VPN traffic. I'd further suggest though that there are many common and legitimate uses of VPN so most network admins don't flag it for review. I would say Tor traffic is far less likely to fly under the radar.

    – jorfus
    Feb 28 at 18:25











  • I'm not sure if it matters enough, you should consider mentioning that an ISP could inspect your DNS traffic to 1.1.1.1 (or others) as well. It requires DPI on their end, but is feasible enough that they may decide to implement it. Also, if you are using a VPN, ideally your DNS will be routed through the tunnel as well, so the choice of which DNS provider you use matters less (in terms of ISP snooping at least).

    – Vidia
    2 days ago











  • @Vidia some DNS providers, such as 1.1.1.1 or 8.8.8.8 implement DNS-over-HTTPS. Your ISP may still know which websites you are visiting through other means (eg. TLS-SNI) but your DNS requests should be safe from eavesdroppers.

    – Droplet
    2 days ago



















6














Your parents will not normally have the authority to retrieve data from the ISP.



An ISP does not offer this type of information on request. You need some type of government warrant before they're released, and the process is non-trivial.



If you're worried about pr0n and simply silly stuff, then don't worry about it.



If you're Dread Pirate Roberts v2.0, and am asking on Stack Exchange for answers... this is a VERY ironic turn of events... since v1.0 was busted via Stack Exchange!






share|improve this answer



















  • 2





    Thanks to the current FCC, ISPs are legally able to sell anyone's browser history--they just won't sell to commonfolk.

    – Amalgovinus
    yesterday



















1














When you erase the router history, you are hiding which device connected to your router stablished the communication.



The ISP still knows and stores the traffic that outcomes from your router to internet.



To hide traffic to your parents, any secured VPN should be enough:
Your ISP will know your are connected to a VPN but not the real traffic. On the other hand, the VPN provider will know the traffic, but in most cases not the origin



So, your parents will need both pieces (ISP & VPN provider) to solve the puzzle. In this way, unless they are federal I think your privacy should be safe.



If you want to play next level, as suggested in previous answers use Tor.






share|improve this answer










New contributor




DrJuzo is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.





















  • This answer is difficult to read and doesn't seem to provide any new / useful information.

    – Qwertie
    Feb 27 at 22:53






  • 2





    1. using TOR is not forensics-proof... I know you're using TOR by looking at logs and 2. TOR exposes the OP to a whole different level of abuse.

    – MGoBlue93
    Feb 27 at 23:45











  • @MGoBlue93 It's Tor, not TOR. And if you want to make it difficult to discover the use of Tor, you can use a bridge relay with pluggable transports. That obfuscates the protocol to prevent an ISP from realizing you are using Tor. It is especially useful if your ISP or government tries to censor the Tor network.

    – forest
    14 hours ago





















1














Any website you browsed will be saved in ISP software (ex: MikroTik) which shows IP address, time and browsed url. If you have multiple devices running on same internet connection, even then information is going to be saved in ISP logs.



Only way to hide websites you are using is by securing.




  1. VPN: When something is browsed using any browser, first it goes through your internet connection to website which you are looking for but using VPN, first it goes from your internet connection to VPN IP address, then the website you are browsing. At this time your ISP will not be able to log whatever you are browsing, neither google nor any search engine will be able to log your data as they see VPN's IP address than yours.

  2. Firefox Private Browsing or Chrome Incognito prevent history and browsing data from being saved on the computer you’re using, but if there is in fact a piece of network hardware monitoring connections, using these browser features will not help.

  3. Browsec: Its a plugin/extension in firefox & chrome which works as VPN. You can use this if you want only your browser data to be hidden or secured.






share|improve this answer










New contributor




Akram is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.




























    0














    In answer to the OP's actual questions.



    Yes, it is still visible and not deleted from existence.



    So anything you have looked at will be available for your ISP to deliver to the account holder or law enforcement/government agencies etc.



    Now if you want to stop the data being so easy to gather, (not impossible but shall we say financially restrictive) look at the other answers which show you some good ways of providing deniability, note I do not say you could hide you were up to something. If your parents say you've been using Tor or a VPN you can always say it was to look at TV shows that were restricted in your country rather then searching for well whatever triggered your original question.

    Also don't use incognito mode it hides nothing from your ISP it only stops the local browser from storing your browser history.






    share|improve this answer

































      0














      Regular consumer routers save basic identifiers of devices that have been connected to it. Some routers, especially many of the newer ones, do allow basic logging of hostnames or sites visited based on DNS lookups, but usually not full URLs. Some can be configured to send periodic emails of the log. Depending on the router, it may be possible to unplug it to clear the log. If you know how big your router's log is, and you know that email is turned off, you could try to get rid of the old log data by visiting lots of random websites. ISPs generally do not keep logs, at least not logs that they share. Their main concern is with spam being generated from infected customer hosts within their network.



      The NSA does log everything that they can, and this might be used against you in the future.



      If you do know that logs were kept, then you better act fast and invite some friends over so that they can be blamed for the naughty sites, and set up a temporary Tor exit node or other public proxy on your computer so that you can blame it on that. This is only if the situation is serious.






      share|improve this answer
























        protected by Community yesterday



        Thank you for your interest in this question.
        Because it has attracted low-quality or spam answers that had to be removed, posting an answer now requires 10 reputation on this site (the association bonus does not count).



        Would you like to answer one of these unanswered questions instead?














        8 Answers
        8






        active

        oldest

        votes








        8 Answers
        8






        active

        oldest

        votes









        active

        oldest

        votes






        active

        oldest

        votes









        127















        If I delete my router's history, is it still visible and can my ISP still provide it to my parents? Or is it deleted from existence?




        Your ISP's record of your network usage isn't in any way affected by you doing anything to your router. You could wipe its memory, subject it to an EMP, and crush its chips to dust, and it wouldn't have any effect on them. :-) They maintain their own logs, which you cannot delete.



        Whether your ISP will provide that information to your parents is another question, I expect it varies by locale/jurisdiction and possibly ISP.



        You can make it (nearly) impossible for your ISP to know what sites you're visiting by using Tor or similar. The project includes Tor Browser, based on Firefox ESR, which makes it really easy to browse over Tor. You can also use the Brave browser (no affiliation), based on the Chromium project, in its "Private window with Tor" mode. This is not user-configuring a browser for Tor (which the Tor project advises against, it's too easy to miss out important things), it's a browser from privacy-obsessed people with a Tor-enabled private browsing mode. Both Tor Browser and Brave have trade-offs, see this tweet thread (in particular the replies from Tom Lowenthal, their Security & Privacy PM). Some people say "You should never browse with Tor with anything but Tor Browser" but it's more nuanced than that.






        share|improve this answer










        New contributor




        T.J. Crowder is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
        Check out our Code of Conduct.





















        • Comments are not for extended discussion; this conversation has been moved to chat.

          – Rory Alsop
          yesterday











        • Please note that Brave browser has vastly inferior fingerprinting resistance compared to Tor browser. While the mere use of Tor is sufficient to avoid ISP-level sniffing, the use of an alternate browser like Brave makes it possible for the websites you visit to uniquely identify your computer across visits.

          – forest
          14 hours ago











        • @forest - That discussion has already been moved to chat once. It's not useful to start it here again. Separately: You've been asked before for citations to back up your claims and still haven't provided any. Please do so (in the chat).

          – T.J. Crowder
          8 hours ago


















        127















        If I delete my router's history, is it still visible and can my ISP still provide it to my parents? Or is it deleted from existence?




        Your ISP's record of your network usage isn't in any way affected by you doing anything to your router. You could wipe its memory, subject it to an EMP, and crush its chips to dust, and it wouldn't have any effect on them. :-) They maintain their own logs, which you cannot delete.



        Whether your ISP will provide that information to your parents is another question, I expect it varies by locale/jurisdiction and possibly ISP.



        You can make it (nearly) impossible for your ISP to know what sites you're visiting by using Tor or similar. The project includes Tor Browser, based on Firefox ESR, which makes it really easy to browse over Tor. You can also use the Brave browser (no affiliation), based on the Chromium project, in its "Private window with Tor" mode. This is not user-configuring a browser for Tor (which the Tor project advises against, it's too easy to miss out important things), it's a browser from privacy-obsessed people with a Tor-enabled private browsing mode. Both Tor Browser and Brave have trade-offs, see this tweet thread (in particular the replies from Tom Lowenthal, their Security & Privacy PM). Some people say "You should never browse with Tor with anything but Tor Browser" but it's more nuanced than that.






        share|improve this answer










        New contributor




        T.J. Crowder is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
        Check out our Code of Conduct.





















        • Comments are not for extended discussion; this conversation has been moved to chat.

          – Rory Alsop
          yesterday











        • Please note that Brave browser has vastly inferior fingerprinting resistance compared to Tor browser. While the mere use of Tor is sufficient to avoid ISP-level sniffing, the use of an alternate browser like Brave makes it possible for the websites you visit to uniquely identify your computer across visits.

          – forest
          14 hours ago











        • @forest - That discussion has already been moved to chat once. It's not useful to start it here again. Separately: You've been asked before for citations to back up your claims and still haven't provided any. Please do so (in the chat).

          – T.J. Crowder
          8 hours ago
















        127












        127








        127








        If I delete my router's history, is it still visible and can my ISP still provide it to my parents? Or is it deleted from existence?




        Your ISP's record of your network usage isn't in any way affected by you doing anything to your router. You could wipe its memory, subject it to an EMP, and crush its chips to dust, and it wouldn't have any effect on them. :-) They maintain their own logs, which you cannot delete.



        Whether your ISP will provide that information to your parents is another question, I expect it varies by locale/jurisdiction and possibly ISP.



        You can make it (nearly) impossible for your ISP to know what sites you're visiting by using Tor or similar. The project includes Tor Browser, based on Firefox ESR, which makes it really easy to browse over Tor. You can also use the Brave browser (no affiliation), based on the Chromium project, in its "Private window with Tor" mode. This is not user-configuring a browser for Tor (which the Tor project advises against, it's too easy to miss out important things), it's a browser from privacy-obsessed people with a Tor-enabled private browsing mode. Both Tor Browser and Brave have trade-offs, see this tweet thread (in particular the replies from Tom Lowenthal, their Security & Privacy PM). Some people say "You should never browse with Tor with anything but Tor Browser" but it's more nuanced than that.






        share|improve this answer










        New contributor




        T.J. Crowder is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
        Check out our Code of Conduct.











        If I delete my router's history, is it still visible and can my ISP still provide it to my parents? Or is it deleted from existence?




        Your ISP's record of your network usage isn't in any way affected by you doing anything to your router. You could wipe its memory, subject it to an EMP, and crush its chips to dust, and it wouldn't have any effect on them. :-) They maintain their own logs, which you cannot delete.



        Whether your ISP will provide that information to your parents is another question, I expect it varies by locale/jurisdiction and possibly ISP.



        You can make it (nearly) impossible for your ISP to know what sites you're visiting by using Tor or similar. The project includes Tor Browser, based on Firefox ESR, which makes it really easy to browse over Tor. You can also use the Brave browser (no affiliation), based on the Chromium project, in its "Private window with Tor" mode. This is not user-configuring a browser for Tor (which the Tor project advises against, it's too easy to miss out important things), it's a browser from privacy-obsessed people with a Tor-enabled private browsing mode. Both Tor Browser and Brave have trade-offs, see this tweet thread (in particular the replies from Tom Lowenthal, their Security & Privacy PM). Some people say "You should never browse with Tor with anything but Tor Browser" but it's more nuanced than that.







        share|improve this answer










        New contributor




        T.J. Crowder is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
        Check out our Code of Conduct.









        share|improve this answer



        share|improve this answer








        edited yesterday





















        New contributor




        T.J. Crowder is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
        Check out our Code of Conduct.









        answered Feb 27 at 15:17









        T.J. CrowderT.J. Crowder

        855156




        855156




        New contributor




        T.J. Crowder is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
        Check out our Code of Conduct.





        New contributor





        T.J. Crowder is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
        Check out our Code of Conduct.






        T.J. Crowder is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
        Check out our Code of Conduct.













        • Comments are not for extended discussion; this conversation has been moved to chat.

          – Rory Alsop
          yesterday











        • Please note that Brave browser has vastly inferior fingerprinting resistance compared to Tor browser. While the mere use of Tor is sufficient to avoid ISP-level sniffing, the use of an alternate browser like Brave makes it possible for the websites you visit to uniquely identify your computer across visits.

          – forest
          14 hours ago











        • @forest - That discussion has already been moved to chat once. It's not useful to start it here again. Separately: You've been asked before for citations to back up your claims and still haven't provided any. Please do so (in the chat).

          – T.J. Crowder
          8 hours ago





















        • Comments are not for extended discussion; this conversation has been moved to chat.

          – Rory Alsop
          yesterday











        • Please note that Brave browser has vastly inferior fingerprinting resistance compared to Tor browser. While the mere use of Tor is sufficient to avoid ISP-level sniffing, the use of an alternate browser like Brave makes it possible for the websites you visit to uniquely identify your computer across visits.

          – forest
          14 hours ago











        • @forest - That discussion has already been moved to chat once. It's not useful to start it here again. Separately: You've been asked before for citations to back up your claims and still haven't provided any. Please do so (in the chat).

          – T.J. Crowder
          8 hours ago



















        Comments are not for extended discussion; this conversation has been moved to chat.

        – Rory Alsop
        yesterday





        Comments are not for extended discussion; this conversation has been moved to chat.

        – Rory Alsop
        yesterday













        Please note that Brave browser has vastly inferior fingerprinting resistance compared to Tor browser. While the mere use of Tor is sufficient to avoid ISP-level sniffing, the use of an alternate browser like Brave makes it possible for the websites you visit to uniquely identify your computer across visits.

        – forest
        14 hours ago





        Please note that Brave browser has vastly inferior fingerprinting resistance compared to Tor browser. While the mere use of Tor is sufficient to avoid ISP-level sniffing, the use of an alternate browser like Brave makes it possible for the websites you visit to uniquely identify your computer across visits.

        – forest
        14 hours ago













        @forest - That discussion has already been moved to chat once. It's not useful to start it here again. Separately: You've been asked before for citations to back up your claims and still haven't provided any. Please do so (in the chat).

        – T.J. Crowder
        8 hours ago







        @forest - That discussion has already been moved to chat once. It's not useful to start it here again. Separately: You've been asked before for citations to back up your claims and still haven't provided any. Please do so (in the chat).

        – T.J. Crowder
        8 hours ago















        38














        Routers usually do not store history and ISPs, while they may record such things on internal logs, do not give them out to anyone without a court order. You do not need to worry about your parents finding the naughty sites you visited unless it's in your browser history. Just turn on incognito mode and don't worry.



        While it is theoretically possible that some ISPs may have a child-safe mode where they record and even report visited sites to the account holders, I have never heard of this happening. It would also be fraught with legal risks, so it is unlikely to be a realistic threat. If you are worried about that threat, you can use a VPN or Tor to encrypt the connection going through your ISP so they cannot log anything.






        share|improve this answer





















        • 66





          I don’t think that’s a safe assumption. The ISP might turn over records of an account’s activity to the legitimate account holder without a court order.

          – John Deters
          Feb 27 at 15:52






        • 15





          If the OP's parents are the account holder it's perfectly reasonable for the ISP to give them log data, since it is their data.

          – NathanOliver
          Feb 27 at 17:21






        • 4





          @NathanOliver Wouldn't that depend on jurisdictions pretty heavily? I assume GDPR would cover that; but in other places, is there anything that actually suggests the data they legally collect about you is still "yours"?

          – JMac
          Feb 27 at 17:37






        • 3





          @JMac Why would the GDPR apply here? What websites were visited from an IP doesn't seem "personal data" and would certainly be covered by pseudonymisation no?

          – Voo
          Feb 27 at 18:56






        • 7





          @Voo I'm pretty sure that IP address plus date and time counts as personally identifiable data under the GDPR. Even if it doesn't actually, it's certainly borderline enough that any DPO worth their salt should advice strong caution.

          – a CVn
          Feb 27 at 21:17
















        38














        Routers usually do not store history and ISPs, while they may record such things on internal logs, do not give them out to anyone without a court order. You do not need to worry about your parents finding the naughty sites you visited unless it's in your browser history. Just turn on incognito mode and don't worry.



        While it is theoretically possible that some ISPs may have a child-safe mode where they record and even report visited sites to the account holders, I have never heard of this happening. It would also be fraught with legal risks, so it is unlikely to be a realistic threat. If you are worried about that threat, you can use a VPN or Tor to encrypt the connection going through your ISP so they cannot log anything.






        share|improve this answer





















        • 66





          I don’t think that’s a safe assumption. The ISP might turn over records of an account’s activity to the legitimate account holder without a court order.

          – John Deters
          Feb 27 at 15:52






        • 15





          If the OP's parents are the account holder it's perfectly reasonable for the ISP to give them log data, since it is their data.

          – NathanOliver
          Feb 27 at 17:21






        • 4





          @NathanOliver Wouldn't that depend on jurisdictions pretty heavily? I assume GDPR would cover that; but in other places, is there anything that actually suggests the data they legally collect about you is still "yours"?

          – JMac
          Feb 27 at 17:37






        • 3





          @JMac Why would the GDPR apply here? What websites were visited from an IP doesn't seem "personal data" and would certainly be covered by pseudonymisation no?

          – Voo
          Feb 27 at 18:56






        • 7





          @Voo I'm pretty sure that IP address plus date and time counts as personally identifiable data under the GDPR. Even if it doesn't actually, it's certainly borderline enough that any DPO worth their salt should advice strong caution.

          – a CVn
          Feb 27 at 21:17














        38












        38








        38







        Routers usually do not store history and ISPs, while they may record such things on internal logs, do not give them out to anyone without a court order. You do not need to worry about your parents finding the naughty sites you visited unless it's in your browser history. Just turn on incognito mode and don't worry.



        While it is theoretically possible that some ISPs may have a child-safe mode where they record and even report visited sites to the account holders, I have never heard of this happening. It would also be fraught with legal risks, so it is unlikely to be a realistic threat. If you are worried about that threat, you can use a VPN or Tor to encrypt the connection going through your ISP so they cannot log anything.






        share|improve this answer















        Routers usually do not store history and ISPs, while they may record such things on internal logs, do not give them out to anyone without a court order. You do not need to worry about your parents finding the naughty sites you visited unless it's in your browser history. Just turn on incognito mode and don't worry.



        While it is theoretically possible that some ISPs may have a child-safe mode where they record and even report visited sites to the account holders, I have never heard of this happening. It would also be fraught with legal risks, so it is unlikely to be a realistic threat. If you are worried about that threat, you can use a VPN or Tor to encrypt the connection going through your ISP so they cannot log anything.







        share|improve this answer














        share|improve this answer



        share|improve this answer








        edited 14 hours ago

























        answered Feb 27 at 12:35









        forestforest

        37.1k17120132




        37.1k17120132








        • 66





          I don’t think that’s a safe assumption. The ISP might turn over records of an account’s activity to the legitimate account holder without a court order.

          – John Deters
          Feb 27 at 15:52






        • 15





          If the OP's parents are the account holder it's perfectly reasonable for the ISP to give them log data, since it is their data.

          – NathanOliver
          Feb 27 at 17:21






        • 4





          @NathanOliver Wouldn't that depend on jurisdictions pretty heavily? I assume GDPR would cover that; but in other places, is there anything that actually suggests the data they legally collect about you is still "yours"?

          – JMac
          Feb 27 at 17:37






        • 3





          @JMac Why would the GDPR apply here? What websites were visited from an IP doesn't seem "personal data" and would certainly be covered by pseudonymisation no?

          – Voo
          Feb 27 at 18:56






        • 7





          @Voo I'm pretty sure that IP address plus date and time counts as personally identifiable data under the GDPR. Even if it doesn't actually, it's certainly borderline enough that any DPO worth their salt should advice strong caution.

          – a CVn
          Feb 27 at 21:17














        • 66





          I don’t think that’s a safe assumption. The ISP might turn over records of an account’s activity to the legitimate account holder without a court order.

          – John Deters
          Feb 27 at 15:52






        • 15





          If the OP's parents are the account holder it's perfectly reasonable for the ISP to give them log data, since it is their data.

          – NathanOliver
          Feb 27 at 17:21






        • 4





          @NathanOliver Wouldn't that depend on jurisdictions pretty heavily? I assume GDPR would cover that; but in other places, is there anything that actually suggests the data they legally collect about you is still "yours"?

          – JMac
          Feb 27 at 17:37






        • 3





          @JMac Why would the GDPR apply here? What websites were visited from an IP doesn't seem "personal data" and would certainly be covered by pseudonymisation no?

          – Voo
          Feb 27 at 18:56






        • 7





          @Voo I'm pretty sure that IP address plus date and time counts as personally identifiable data under the GDPR. Even if it doesn't actually, it's certainly borderline enough that any DPO worth their salt should advice strong caution.

          – a CVn
          Feb 27 at 21:17








        66




        66





        I don’t think that’s a safe assumption. The ISP might turn over records of an account’s activity to the legitimate account holder without a court order.

        – John Deters
        Feb 27 at 15:52





        I don’t think that’s a safe assumption. The ISP might turn over records of an account’s activity to the legitimate account holder without a court order.

        – John Deters
        Feb 27 at 15:52




        15




        15





        If the OP's parents are the account holder it's perfectly reasonable for the ISP to give them log data, since it is their data.

        – NathanOliver
        Feb 27 at 17:21





        If the OP's parents are the account holder it's perfectly reasonable for the ISP to give them log data, since it is their data.

        – NathanOliver
        Feb 27 at 17:21




        4




        4





        @NathanOliver Wouldn't that depend on jurisdictions pretty heavily? I assume GDPR would cover that; but in other places, is there anything that actually suggests the data they legally collect about you is still "yours"?

        – JMac
        Feb 27 at 17:37





        @NathanOliver Wouldn't that depend on jurisdictions pretty heavily? I assume GDPR would cover that; but in other places, is there anything that actually suggests the data they legally collect about you is still "yours"?

        – JMac
        Feb 27 at 17:37




        3




        3





        @JMac Why would the GDPR apply here? What websites were visited from an IP doesn't seem "personal data" and would certainly be covered by pseudonymisation no?

        – Voo
        Feb 27 at 18:56





        @JMac Why would the GDPR apply here? What websites were visited from an IP doesn't seem "personal data" and would certainly be covered by pseudonymisation no?

        – Voo
        Feb 27 at 18:56




        7




        7





        @Voo I'm pretty sure that IP address plus date and time counts as personally identifiable data under the GDPR. Even if it doesn't actually, it's certainly borderline enough that any DPO worth their salt should advice strong caution.

        – a CVn
        Feb 27 at 21:17





        @Voo I'm pretty sure that IP address plus date and time counts as personally identifiable data under the GDPR. Even if it doesn't actually, it's certainly borderline enough that any DPO worth their salt should advice strong caution.

        – a CVn
        Feb 27 at 21:17











        11














        ISPs can absolutely log traffic upstream from your router.



        The easiest way for an ISP to inspect what users are doing is by inspecting logged dns queries. People can get around this by using non ISP dns servers such as 1.1.1.1 (cloudflare dns) or 8.8.8.8 (google dns)



        The next easiest is to actually log connections. To get around this, people use VPN or an onion router such as Tor. This causes the traffic to all go out over a single encrypted tunnel (or in the case of tor many encrypted tunnels) till it leaves the network owned by the snoopers. The Opera browser now includes free ephemeral VPN. If you wanted to build your own openvpn server in the cloud there are some setup scripts on github. If you live under a repressive government they will try to block or disrupt VPN traffic (note to representatives of repressive governments, privacy is necessary for information security and basic human dignity). In that case you may wish to explore shadowsocks.



        Do be aware that most free VPN services fund their operation by monetizing your traffic data. This means they actively collect and actively sell your connection data. This might be preferable to being watched by people who know you, but do keep it in mind.



        Opera VPN + cloudflare DNS should provide privacy ISP from account owners. Do be aware of local cached data (incognito mode is your friend here). Tor works too. Keep in mind that Tor traffic has a distinctive fingerprint. Network administrators who are interested in who might be doing illegal things can watch for that traffic. There was a report recently of a college student who sent a threatening email in order to delay an exam. The network administrators simply checked network logs for who on campus was using Tor during the minute the email was received and then said student received a knock, some new chrome bracelets and didn't have to worry about exams anymore.






        share|improve this answer





















        • 1





          VPN traffic also has a pretty significant fingerprint, so if someone is logging DPI data they can just as easily look for signs of VPN traffic as for signs of Tor traffic. As for Tor, someone said (I think it was in a DEFCON presentation) that it is designed to make Tor users look alike, not make Tor users look like non-Tor users. Tor offers anonymity, not privacy or confidentiality (and if the baseband traffic is unencrypted and/or unauthenticated, it's actually probably easier to track people who are using Tor, and mess with their traffic, due to the relatively small number of exit nodes).

          – a CVn
          Feb 27 at 21:22













        • "VPN traffic also has a pretty significant fingerprint," Plus, DNS requests are NOT encrypted by the VPN... that's how Big Tech works around not having access to cookies and such; they infer data about you from lookups.

          – MGoBlue93
          Feb 27 at 23:35











        • Regarding previous comments. Absolutely, VPN traffic has a distinctive fingerprint. It often uses distinctive TCP or UDP ports (VPN comes in a handful of varieties). Even when it uses a common port such as 443 it has distinctive characteristics. We know this because the great firewall of china is able to block and/or degrade SSL VPN traffic. I'd further suggest though that there are many common and legitimate uses of VPN so most network admins don't flag it for review. I would say Tor traffic is far less likely to fly under the radar.

          – jorfus
          Feb 28 at 18:25











        • I'm not sure if it matters enough, you should consider mentioning that an ISP could inspect your DNS traffic to 1.1.1.1 (or others) as well. It requires DPI on their end, but is feasible enough that they may decide to implement it. Also, if you are using a VPN, ideally your DNS will be routed through the tunnel as well, so the choice of which DNS provider you use matters less (in terms of ISP snooping at least).

          – Vidia
          2 days ago











        • @Vidia some DNS providers, such as 1.1.1.1 or 8.8.8.8 implement DNS-over-HTTPS. Your ISP may still know which websites you are visiting through other means (eg. TLS-SNI) but your DNS requests should be safe from eavesdroppers.

          – Droplet
          2 days ago
















        11














        ISPs can absolutely log traffic upstream from your router.



        The easiest way for an ISP to inspect what users are doing is by inspecting logged dns queries. People can get around this by using non ISP dns servers such as 1.1.1.1 (cloudflare dns) or 8.8.8.8 (google dns)



        The next easiest is to actually log connections. To get around this, people use VPN or an onion router such as Tor. This causes the traffic to all go out over a single encrypted tunnel (or in the case of tor many encrypted tunnels) till it leaves the network owned by the snoopers. The Opera browser now includes free ephemeral VPN. If you wanted to build your own openvpn server in the cloud there are some setup scripts on github. If you live under a repressive government they will try to block or disrupt VPN traffic (note to representatives of repressive governments, privacy is necessary for information security and basic human dignity). In that case you may wish to explore shadowsocks.



        Do be aware that most free VPN services fund their operation by monetizing your traffic data. This means they actively collect and actively sell your connection data. This might be preferable to being watched by people who know you, but do keep it in mind.



        Opera VPN + cloudflare DNS should provide privacy ISP from account owners. Do be aware of local cached data (incognito mode is your friend here). Tor works too. Keep in mind that Tor traffic has a distinctive fingerprint. Network administrators who are interested in who might be doing illegal things can watch for that traffic. There was a report recently of a college student who sent a threatening email in order to delay an exam. The network administrators simply checked network logs for who on campus was using Tor during the minute the email was received and then said student received a knock, some new chrome bracelets and didn't have to worry about exams anymore.






        share|improve this answer





















        • 1





          VPN traffic also has a pretty significant fingerprint, so if someone is logging DPI data they can just as easily look for signs of VPN traffic as for signs of Tor traffic. As for Tor, someone said (I think it was in a DEFCON presentation) that it is designed to make Tor users look alike, not make Tor users look like non-Tor users. Tor offers anonymity, not privacy or confidentiality (and if the baseband traffic is unencrypted and/or unauthenticated, it's actually probably easier to track people who are using Tor, and mess with their traffic, due to the relatively small number of exit nodes).

          – a CVn
          Feb 27 at 21:22













        • "VPN traffic also has a pretty significant fingerprint," Plus, DNS requests are NOT encrypted by the VPN... that's how Big Tech works around not having access to cookies and such; they infer data about you from lookups.

          – MGoBlue93
          Feb 27 at 23:35











        • Regarding previous comments. Absolutely, VPN traffic has a distinctive fingerprint. It often uses distinctive TCP or UDP ports (VPN comes in a handful of varieties). Even when it uses a common port such as 443 it has distinctive characteristics. We know this because the great firewall of china is able to block and/or degrade SSL VPN traffic. I'd further suggest though that there are many common and legitimate uses of VPN so most network admins don't flag it for review. I would say Tor traffic is far less likely to fly under the radar.

          – jorfus
          Feb 28 at 18:25











        • I'm not sure if it matters enough, you should consider mentioning that an ISP could inspect your DNS traffic to 1.1.1.1 (or others) as well. It requires DPI on their end, but is feasible enough that they may decide to implement it. Also, if you are using a VPN, ideally your DNS will be routed through the tunnel as well, so the choice of which DNS provider you use matters less (in terms of ISP snooping at least).

          – Vidia
          2 days ago











        • @Vidia some DNS providers, such as 1.1.1.1 or 8.8.8.8 implement DNS-over-HTTPS. Your ISP may still know which websites you are visiting through other means (eg. TLS-SNI) but your DNS requests should be safe from eavesdroppers.

          – Droplet
          2 days ago














        11












        11








        11







        ISPs can absolutely log traffic upstream from your router.



        The easiest way for an ISP to inspect what users are doing is by inspecting logged dns queries. People can get around this by using non ISP dns servers such as 1.1.1.1 (cloudflare dns) or 8.8.8.8 (google dns)



        The next easiest is to actually log connections. To get around this, people use VPN or an onion router such as Tor. This causes the traffic to all go out over a single encrypted tunnel (or in the case of tor many encrypted tunnels) till it leaves the network owned by the snoopers. The Opera browser now includes free ephemeral VPN. If you wanted to build your own openvpn server in the cloud there are some setup scripts on github. If you live under a repressive government they will try to block or disrupt VPN traffic (note to representatives of repressive governments, privacy is necessary for information security and basic human dignity). In that case you may wish to explore shadowsocks.



        Do be aware that most free VPN services fund their operation by monetizing your traffic data. This means they actively collect and actively sell your connection data. This might be preferable to being watched by people who know you, but do keep it in mind.



        Opera VPN + cloudflare DNS should provide privacy ISP from account owners. Do be aware of local cached data (incognito mode is your friend here). Tor works too. Keep in mind that Tor traffic has a distinctive fingerprint. Network administrators who are interested in who might be doing illegal things can watch for that traffic. There was a report recently of a college student who sent a threatening email in order to delay an exam. The network administrators simply checked network logs for who on campus was using Tor during the minute the email was received and then said student received a knock, some new chrome bracelets and didn't have to worry about exams anymore.






        share|improve this answer















        ISPs can absolutely log traffic upstream from your router.



        The easiest way for an ISP to inspect what users are doing is by inspecting logged dns queries. People can get around this by using non ISP dns servers such as 1.1.1.1 (cloudflare dns) or 8.8.8.8 (google dns)



        The next easiest is to actually log connections. To get around this, people use VPN or an onion router such as Tor. This causes the traffic to all go out over a single encrypted tunnel (or in the case of tor many encrypted tunnels) till it leaves the network owned by the snoopers. The Opera browser now includes free ephemeral VPN. If you wanted to build your own openvpn server in the cloud there are some setup scripts on github. If you live under a repressive government they will try to block or disrupt VPN traffic (note to representatives of repressive governments, privacy is necessary for information security and basic human dignity). In that case you may wish to explore shadowsocks.



        Do be aware that most free VPN services fund their operation by monetizing your traffic data. This means they actively collect and actively sell your connection data. This might be preferable to being watched by people who know you, but do keep it in mind.



        Opera VPN + cloudflare DNS should provide privacy ISP from account owners. Do be aware of local cached data (incognito mode is your friend here). Tor works too. Keep in mind that Tor traffic has a distinctive fingerprint. Network administrators who are interested in who might be doing illegal things can watch for that traffic. There was a report recently of a college student who sent a threatening email in order to delay an exam. The network administrators simply checked network logs for who on campus was using Tor during the minute the email was received and then said student received a knock, some new chrome bracelets and didn't have to worry about exams anymore.







        share|improve this answer














        share|improve this answer



        share|improve this answer








        edited Feb 27 at 19:49

























        answered Feb 27 at 17:47









        jorfusjorfus

        32126




        32126








        • 1





          VPN traffic also has a pretty significant fingerprint, so if someone is logging DPI data they can just as easily look for signs of VPN traffic as for signs of Tor traffic. As for Tor, someone said (I think it was in a DEFCON presentation) that it is designed to make Tor users look alike, not make Tor users look like non-Tor users. Tor offers anonymity, not privacy or confidentiality (and if the baseband traffic is unencrypted and/or unauthenticated, it's actually probably easier to track people who are using Tor, and mess with their traffic, due to the relatively small number of exit nodes).

          – a CVn
          Feb 27 at 21:22













        • "VPN traffic also has a pretty significant fingerprint," Plus, DNS requests are NOT encrypted by the VPN... that's how Big Tech works around not having access to cookies and such; they infer data about you from lookups.

          – MGoBlue93
          Feb 27 at 23:35











        • Regarding previous comments. Absolutely, VPN traffic has a distinctive fingerprint. It often uses distinctive TCP or UDP ports (VPN comes in a handful of varieties). Even when it uses a common port such as 443 it has distinctive characteristics. We know this because the great firewall of china is able to block and/or degrade SSL VPN traffic. I'd further suggest though that there are many common and legitimate uses of VPN so most network admins don't flag it for review. I would say Tor traffic is far less likely to fly under the radar.

          – jorfus
          Feb 28 at 18:25











        • I'm not sure if it matters enough, you should consider mentioning that an ISP could inspect your DNS traffic to 1.1.1.1 (or others) as well. It requires DPI on their end, but is feasible enough that they may decide to implement it. Also, if you are using a VPN, ideally your DNS will be routed through the tunnel as well, so the choice of which DNS provider you use matters less (in terms of ISP snooping at least).

          – Vidia
          2 days ago











        • @Vidia some DNS providers, such as 1.1.1.1 or 8.8.8.8 implement DNS-over-HTTPS. Your ISP may still know which websites you are visiting through other means (eg. TLS-SNI) but your DNS requests should be safe from eavesdroppers.

          – Droplet
          2 days ago














        • 1





          VPN traffic also has a pretty significant fingerprint, so if someone is logging DPI data they can just as easily look for signs of VPN traffic as for signs of Tor traffic. As for Tor, someone said (I think it was in a DEFCON presentation) that it is designed to make Tor users look alike, not make Tor users look like non-Tor users. Tor offers anonymity, not privacy or confidentiality (and if the baseband traffic is unencrypted and/or unauthenticated, it's actually probably easier to track people who are using Tor, and mess with their traffic, due to the relatively small number of exit nodes).

          – a CVn
          Feb 27 at 21:22













        • "VPN traffic also has a pretty significant fingerprint," Plus, DNS requests are NOT encrypted by the VPN... that's how Big Tech works around not having access to cookies and such; they infer data about you from lookups.

          – MGoBlue93
          Feb 27 at 23:35











        • Regarding previous comments. Absolutely, VPN traffic has a distinctive fingerprint. It often uses distinctive TCP or UDP ports (VPN comes in a handful of varieties). Even when it uses a common port such as 443 it has distinctive characteristics. We know this because the great firewall of china is able to block and/or degrade SSL VPN traffic. I'd further suggest though that there are many common and legitimate uses of VPN so most network admins don't flag it for review. I would say Tor traffic is far less likely to fly under the radar.

          – jorfus
          Feb 28 at 18:25











        • I'm not sure if it matters enough, you should consider mentioning that an ISP could inspect your DNS traffic to 1.1.1.1 (or others) as well. It requires DPI on their end, but is feasible enough that they may decide to implement it. Also, if you are using a VPN, ideally your DNS will be routed through the tunnel as well, so the choice of which DNS provider you use matters less (in terms of ISP snooping at least).

          – Vidia
          2 days ago











        • @Vidia some DNS providers, such as 1.1.1.1 or 8.8.8.8 implement DNS-over-HTTPS. Your ISP may still know which websites you are visiting through other means (eg. TLS-SNI) but your DNS requests should be safe from eavesdroppers.

          – Droplet
          2 days ago








        1




        1





        VPN traffic also has a pretty significant fingerprint, so if someone is logging DPI data they can just as easily look for signs of VPN traffic as for signs of Tor traffic. As for Tor, someone said (I think it was in a DEFCON presentation) that it is designed to make Tor users look alike, not make Tor users look like non-Tor users. Tor offers anonymity, not privacy or confidentiality (and if the baseband traffic is unencrypted and/or unauthenticated, it's actually probably easier to track people who are using Tor, and mess with their traffic, due to the relatively small number of exit nodes).

        – a CVn
        Feb 27 at 21:22







        VPN traffic also has a pretty significant fingerprint, so if someone is logging DPI data they can just as easily look for signs of VPN traffic as for signs of Tor traffic. As for Tor, someone said (I think it was in a DEFCON presentation) that it is designed to make Tor users look alike, not make Tor users look like non-Tor users. Tor offers anonymity, not privacy or confidentiality (and if the baseband traffic is unencrypted and/or unauthenticated, it's actually probably easier to track people who are using Tor, and mess with their traffic, due to the relatively small number of exit nodes).

        – a CVn
        Feb 27 at 21:22















        "VPN traffic also has a pretty significant fingerprint," Plus, DNS requests are NOT encrypted by the VPN... that's how Big Tech works around not having access to cookies and such; they infer data about you from lookups.

        – MGoBlue93
        Feb 27 at 23:35





        "VPN traffic also has a pretty significant fingerprint," Plus, DNS requests are NOT encrypted by the VPN... that's how Big Tech works around not having access to cookies and such; they infer data about you from lookups.

        – MGoBlue93
        Feb 27 at 23:35













        Regarding previous comments. Absolutely, VPN traffic has a distinctive fingerprint. It often uses distinctive TCP or UDP ports (VPN comes in a handful of varieties). Even when it uses a common port such as 443 it has distinctive characteristics. We know this because the great firewall of china is able to block and/or degrade SSL VPN traffic. I'd further suggest though that there are many common and legitimate uses of VPN so most network admins don't flag it for review. I would say Tor traffic is far less likely to fly under the radar.

        – jorfus
        Feb 28 at 18:25





        Regarding previous comments. Absolutely, VPN traffic has a distinctive fingerprint. It often uses distinctive TCP or UDP ports (VPN comes in a handful of varieties). Even when it uses a common port such as 443 it has distinctive characteristics. We know this because the great firewall of china is able to block and/or degrade SSL VPN traffic. I'd further suggest though that there are many common and legitimate uses of VPN so most network admins don't flag it for review. I would say Tor traffic is far less likely to fly under the radar.

        – jorfus
        Feb 28 at 18:25













        I'm not sure if it matters enough, you should consider mentioning that an ISP could inspect your DNS traffic to 1.1.1.1 (or others) as well. It requires DPI on their end, but is feasible enough that they may decide to implement it. Also, if you are using a VPN, ideally your DNS will be routed through the tunnel as well, so the choice of which DNS provider you use matters less (in terms of ISP snooping at least).

        – Vidia
        2 days ago





        I'm not sure if it matters enough, you should consider mentioning that an ISP could inspect your DNS traffic to 1.1.1.1 (or others) as well. It requires DPI on their end, but is feasible enough that they may decide to implement it. Also, if you are using a VPN, ideally your DNS will be routed through the tunnel as well, so the choice of which DNS provider you use matters less (in terms of ISP snooping at least).

        – Vidia
        2 days ago













        @Vidia some DNS providers, such as 1.1.1.1 or 8.8.8.8 implement DNS-over-HTTPS. Your ISP may still know which websites you are visiting through other means (eg. TLS-SNI) but your DNS requests should be safe from eavesdroppers.

        – Droplet
        2 days ago





        @Vidia some DNS providers, such as 1.1.1.1 or 8.8.8.8 implement DNS-over-HTTPS. Your ISP may still know which websites you are visiting through other means (eg. TLS-SNI) but your DNS requests should be safe from eavesdroppers.

        – Droplet
        2 days ago











        6














        Your parents will not normally have the authority to retrieve data from the ISP.



        An ISP does not offer this type of information on request. You need some type of government warrant before they're released, and the process is non-trivial.



        If you're worried about pr0n and simply silly stuff, then don't worry about it.



        If you're Dread Pirate Roberts v2.0, and am asking on Stack Exchange for answers... this is a VERY ironic turn of events... since v1.0 was busted via Stack Exchange!






        share|improve this answer



















        • 2





          Thanks to the current FCC, ISPs are legally able to sell anyone's browser history--they just won't sell to commonfolk.

          – Amalgovinus
          yesterday
















        6














        Your parents will not normally have the authority to retrieve data from the ISP.



        An ISP does not offer this type of information on request. You need some type of government warrant before they're released, and the process is non-trivial.



        If you're worried about pr0n and simply silly stuff, then don't worry about it.



        If you're Dread Pirate Roberts v2.0, and am asking on Stack Exchange for answers... this is a VERY ironic turn of events... since v1.0 was busted via Stack Exchange!






        share|improve this answer



















        • 2





          Thanks to the current FCC, ISPs are legally able to sell anyone's browser history--they just won't sell to commonfolk.

          – Amalgovinus
          yesterday














        6












        6








        6







        Your parents will not normally have the authority to retrieve data from the ISP.



        An ISP does not offer this type of information on request. You need some type of government warrant before they're released, and the process is non-trivial.



        If you're worried about pr0n and simply silly stuff, then don't worry about it.



        If you're Dread Pirate Roberts v2.0, and am asking on Stack Exchange for answers... this is a VERY ironic turn of events... since v1.0 was busted via Stack Exchange!






        share|improve this answer













        Your parents will not normally have the authority to retrieve data from the ISP.



        An ISP does not offer this type of information on request. You need some type of government warrant before they're released, and the process is non-trivial.



        If you're worried about pr0n and simply silly stuff, then don't worry about it.



        If you're Dread Pirate Roberts v2.0, and am asking on Stack Exchange for answers... this is a VERY ironic turn of events... since v1.0 was busted via Stack Exchange!







        share|improve this answer












        share|improve this answer



        share|improve this answer










        answered 2 days ago









        NelsonNelson

        268210




        268210








        • 2





          Thanks to the current FCC, ISPs are legally able to sell anyone's browser history--they just won't sell to commonfolk.

          – Amalgovinus
          yesterday














        • 2





          Thanks to the current FCC, ISPs are legally able to sell anyone's browser history--they just won't sell to commonfolk.

          – Amalgovinus
          yesterday








        2




        2





        Thanks to the current FCC, ISPs are legally able to sell anyone's browser history--they just won't sell to commonfolk.

        – Amalgovinus
        yesterday





        Thanks to the current FCC, ISPs are legally able to sell anyone's browser history--they just won't sell to commonfolk.

        – Amalgovinus
        yesterday











        1














        When you erase the router history, you are hiding which device connected to your router stablished the communication.



        The ISP still knows and stores the traffic that outcomes from your router to internet.



        To hide traffic to your parents, any secured VPN should be enough:
        Your ISP will know your are connected to a VPN but not the real traffic. On the other hand, the VPN provider will know the traffic, but in most cases not the origin



        So, your parents will need both pieces (ISP & VPN provider) to solve the puzzle. In this way, unless they are federal I think your privacy should be safe.



        If you want to play next level, as suggested in previous answers use Tor.






        share|improve this answer










        New contributor




        DrJuzo is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
        Check out our Code of Conduct.





















        • This answer is difficult to read and doesn't seem to provide any new / useful information.

          – Qwertie
          Feb 27 at 22:53






        • 2





          1. using TOR is not forensics-proof... I know you're using TOR by looking at logs and 2. TOR exposes the OP to a whole different level of abuse.

          – MGoBlue93
          Feb 27 at 23:45











        • @MGoBlue93 It's Tor, not TOR. And if you want to make it difficult to discover the use of Tor, you can use a bridge relay with pluggable transports. That obfuscates the protocol to prevent an ISP from realizing you are using Tor. It is especially useful if your ISP or government tries to censor the Tor network.

          – forest
          14 hours ago


















        1














        When you erase the router history, you are hiding which device connected to your router stablished the communication.



        The ISP still knows and stores the traffic that outcomes from your router to internet.



        To hide traffic to your parents, any secured VPN should be enough:
        Your ISP will know your are connected to a VPN but not the real traffic. On the other hand, the VPN provider will know the traffic, but in most cases not the origin



        So, your parents will need both pieces (ISP & VPN provider) to solve the puzzle. In this way, unless they are federal I think your privacy should be safe.



        If you want to play next level, as suggested in previous answers use Tor.






        share|improve this answer










        New contributor




        DrJuzo is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
        Check out our Code of Conduct.





















        • This answer is difficult to read and doesn't seem to provide any new / useful information.

          – Qwertie
          Feb 27 at 22:53






        • 2





          1. using TOR is not forensics-proof... I know you're using TOR by looking at logs and 2. TOR exposes the OP to a whole different level of abuse.

          – MGoBlue93
          Feb 27 at 23:45











        • @MGoBlue93 It's Tor, not TOR. And if you want to make it difficult to discover the use of Tor, you can use a bridge relay with pluggable transports. That obfuscates the protocol to prevent an ISP from realizing you are using Tor. It is especially useful if your ISP or government tries to censor the Tor network.

          – forest
          14 hours ago
















        1












        1








        1







        When you erase the router history, you are hiding which device connected to your router stablished the communication.



        The ISP still knows and stores the traffic that outcomes from your router to internet.



        To hide traffic to your parents, any secured VPN should be enough:
        Your ISP will know your are connected to a VPN but not the real traffic. On the other hand, the VPN provider will know the traffic, but in most cases not the origin



        So, your parents will need both pieces (ISP & VPN provider) to solve the puzzle. In this way, unless they are federal I think your privacy should be safe.



        If you want to play next level, as suggested in previous answers use Tor.






        share|improve this answer










        New contributor




        DrJuzo is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
        Check out our Code of Conduct.










        When you erase the router history, you are hiding which device connected to your router stablished the communication.



        The ISP still knows and stores the traffic that outcomes from your router to internet.



        To hide traffic to your parents, any secured VPN should be enough:
        Your ISP will know your are connected to a VPN but not the real traffic. On the other hand, the VPN provider will know the traffic, but in most cases not the origin



        So, your parents will need both pieces (ISP & VPN provider) to solve the puzzle. In this way, unless they are federal I think your privacy should be safe.



        If you want to play next level, as suggested in previous answers use Tor.







        share|improve this answer










        New contributor




        DrJuzo is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
        Check out our Code of Conduct.









        share|improve this answer



        share|improve this answer








        edited Feb 27 at 23:17





















        New contributor




        DrJuzo is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
        Check out our Code of Conduct.









        answered Feb 27 at 22:44









        DrJuzoDrJuzo

        213




        213




        New contributor




        DrJuzo is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
        Check out our Code of Conduct.





        New contributor





        DrJuzo is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
        Check out our Code of Conduct.






        DrJuzo is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
        Check out our Code of Conduct.













        • This answer is difficult to read and doesn't seem to provide any new / useful information.

          – Qwertie
          Feb 27 at 22:53






        • 2





          1. using TOR is not forensics-proof... I know you're using TOR by looking at logs and 2. TOR exposes the OP to a whole different level of abuse.

          – MGoBlue93
          Feb 27 at 23:45











        • @MGoBlue93 It's Tor, not TOR. And if you want to make it difficult to discover the use of Tor, you can use a bridge relay with pluggable transports. That obfuscates the protocol to prevent an ISP from realizing you are using Tor. It is especially useful if your ISP or government tries to censor the Tor network.

          – forest
          14 hours ago





















        • This answer is difficult to read and doesn't seem to provide any new / useful information.

          – Qwertie
          Feb 27 at 22:53






        • 2





          1. using TOR is not forensics-proof... I know you're using TOR by looking at logs and 2. TOR exposes the OP to a whole different level of abuse.

          – MGoBlue93
          Feb 27 at 23:45











        • @MGoBlue93 It's Tor, not TOR. And if you want to make it difficult to discover the use of Tor, you can use a bridge relay with pluggable transports. That obfuscates the protocol to prevent an ISP from realizing you are using Tor. It is especially useful if your ISP or government tries to censor the Tor network.

          – forest
          14 hours ago



















        This answer is difficult to read and doesn't seem to provide any new / useful information.

        – Qwertie
        Feb 27 at 22:53





        This answer is difficult to read and doesn't seem to provide any new / useful information.

        – Qwertie
        Feb 27 at 22:53




        2




        2





        1. using TOR is not forensics-proof... I know you're using TOR by looking at logs and 2. TOR exposes the OP to a whole different level of abuse.

        – MGoBlue93
        Feb 27 at 23:45





        1. using TOR is not forensics-proof... I know you're using TOR by looking at logs and 2. TOR exposes the OP to a whole different level of abuse.

        – MGoBlue93
        Feb 27 at 23:45













        @MGoBlue93 It's Tor, not TOR. And if you want to make it difficult to discover the use of Tor, you can use a bridge relay with pluggable transports. That obfuscates the protocol to prevent an ISP from realizing you are using Tor. It is especially useful if your ISP or government tries to censor the Tor network.

        – forest
        14 hours ago







        @MGoBlue93 It's Tor, not TOR. And if you want to make it difficult to discover the use of Tor, you can use a bridge relay with pluggable transports. That obfuscates the protocol to prevent an ISP from realizing you are using Tor. It is especially useful if your ISP or government tries to censor the Tor network.

        – forest
        14 hours ago













        1














        Any website you browsed will be saved in ISP software (ex: MikroTik) which shows IP address, time and browsed url. If you have multiple devices running on same internet connection, even then information is going to be saved in ISP logs.



        Only way to hide websites you are using is by securing.




        1. VPN: When something is browsed using any browser, first it goes through your internet connection to website which you are looking for but using VPN, first it goes from your internet connection to VPN IP address, then the website you are browsing. At this time your ISP will not be able to log whatever you are browsing, neither google nor any search engine will be able to log your data as they see VPN's IP address than yours.

        2. Firefox Private Browsing or Chrome Incognito prevent history and browsing data from being saved on the computer you’re using, but if there is in fact a piece of network hardware monitoring connections, using these browser features will not help.

        3. Browsec: Its a plugin/extension in firefox & chrome which works as VPN. You can use this if you want only your browser data to be hidden or secured.






        share|improve this answer










        New contributor




        Akram is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
        Check out our Code of Conduct.

























          1














          Any website you browsed will be saved in ISP software (ex: MikroTik) which shows IP address, time and browsed url. If you have multiple devices running on same internet connection, even then information is going to be saved in ISP logs.



          Only way to hide websites you are using is by securing.




          1. VPN: When something is browsed using any browser, first it goes through your internet connection to website which you are looking for but using VPN, first it goes from your internet connection to VPN IP address, then the website you are browsing. At this time your ISP will not be able to log whatever you are browsing, neither google nor any search engine will be able to log your data as they see VPN's IP address than yours.

          2. Firefox Private Browsing or Chrome Incognito prevent history and browsing data from being saved on the computer you’re using, but if there is in fact a piece of network hardware monitoring connections, using these browser features will not help.

          3. Browsec: Its a plugin/extension in firefox & chrome which works as VPN. You can use this if you want only your browser data to be hidden or secured.






          share|improve this answer










          New contributor




          Akram is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
          Check out our Code of Conduct.























            1












            1








            1







            Any website you browsed will be saved in ISP software (ex: MikroTik) which shows IP address, time and browsed url. If you have multiple devices running on same internet connection, even then information is going to be saved in ISP logs.



            Only way to hide websites you are using is by securing.




            1. VPN: When something is browsed using any browser, first it goes through your internet connection to website which you are looking for but using VPN, first it goes from your internet connection to VPN IP address, then the website you are browsing. At this time your ISP will not be able to log whatever you are browsing, neither google nor any search engine will be able to log your data as they see VPN's IP address than yours.

            2. Firefox Private Browsing or Chrome Incognito prevent history and browsing data from being saved on the computer you’re using, but if there is in fact a piece of network hardware monitoring connections, using these browser features will not help.

            3. Browsec: Its a plugin/extension in firefox & chrome which works as VPN. You can use this if you want only your browser data to be hidden or secured.






            share|improve this answer










            New contributor




            Akram is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
            Check out our Code of Conduct.










            Any website you browsed will be saved in ISP software (ex: MikroTik) which shows IP address, time and browsed url. If you have multiple devices running on same internet connection, even then information is going to be saved in ISP logs.



            Only way to hide websites you are using is by securing.




            1. VPN: When something is browsed using any browser, first it goes through your internet connection to website which you are looking for but using VPN, first it goes from your internet connection to VPN IP address, then the website you are browsing. At this time your ISP will not be able to log whatever you are browsing, neither google nor any search engine will be able to log your data as they see VPN's IP address than yours.

            2. Firefox Private Browsing or Chrome Incognito prevent history and browsing data from being saved on the computer you’re using, but if there is in fact a piece of network hardware monitoring connections, using these browser features will not help.

            3. Browsec: Its a plugin/extension in firefox & chrome which works as VPN. You can use this if you want only your browser data to be hidden or secured.







            share|improve this answer










            New contributor




            Akram is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
            Check out our Code of Conduct.









            share|improve this answer



            share|improve this answer








            edited Feb 28 at 14:45









            Robotic Extremeties

            12315




            12315






            New contributor




            Akram is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
            Check out our Code of Conduct.









            answered Feb 28 at 11:17









            AkramAkram

            112




            112




            New contributor




            Akram is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
            Check out our Code of Conduct.





            New contributor





            Akram is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
            Check out our Code of Conduct.






            Akram is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
            Check out our Code of Conduct.























                0














                In answer to the OP's actual questions.



                Yes, it is still visible and not deleted from existence.



                So anything you have looked at will be available for your ISP to deliver to the account holder or law enforcement/government agencies etc.



                Now if you want to stop the data being so easy to gather, (not impossible but shall we say financially restrictive) look at the other answers which show you some good ways of providing deniability, note I do not say you could hide you were up to something. If your parents say you've been using Tor or a VPN you can always say it was to look at TV shows that were restricted in your country rather then searching for well whatever triggered your original question.

                Also don't use incognito mode it hides nothing from your ISP it only stops the local browser from storing your browser history.






                share|improve this answer






























                  0














                  In answer to the OP's actual questions.



                  Yes, it is still visible and not deleted from existence.



                  So anything you have looked at will be available for your ISP to deliver to the account holder or law enforcement/government agencies etc.



                  Now if you want to stop the data being so easy to gather, (not impossible but shall we say financially restrictive) look at the other answers which show you some good ways of providing deniability, note I do not say you could hide you were up to something. If your parents say you've been using Tor or a VPN you can always say it was to look at TV shows that were restricted in your country rather then searching for well whatever triggered your original question.

                  Also don't use incognito mode it hides nothing from your ISP it only stops the local browser from storing your browser history.






                  share|improve this answer




























                    0












                    0








                    0







                    In answer to the OP's actual questions.



                    Yes, it is still visible and not deleted from existence.



                    So anything you have looked at will be available for your ISP to deliver to the account holder or law enforcement/government agencies etc.



                    Now if you want to stop the data being so easy to gather, (not impossible but shall we say financially restrictive) look at the other answers which show you some good ways of providing deniability, note I do not say you could hide you were up to something. If your parents say you've been using Tor or a VPN you can always say it was to look at TV shows that were restricted in your country rather then searching for well whatever triggered your original question.

                    Also don't use incognito mode it hides nothing from your ISP it only stops the local browser from storing your browser history.






                    share|improve this answer















                    In answer to the OP's actual questions.



                    Yes, it is still visible and not deleted from existence.



                    So anything you have looked at will be available for your ISP to deliver to the account holder or law enforcement/government agencies etc.



                    Now if you want to stop the data being so easy to gather, (not impossible but shall we say financially restrictive) look at the other answers which show you some good ways of providing deniability, note I do not say you could hide you were up to something. If your parents say you've been using Tor or a VPN you can always say it was to look at TV shows that were restricted in your country rather then searching for well whatever triggered your original question.

                    Also don't use incognito mode it hides nothing from your ISP it only stops the local browser from storing your browser history.







                    share|improve this answer














                    share|improve this answer



                    share|improve this answer








                    edited 14 hours ago









                    forest

                    37.1k17120132




                    37.1k17120132










                    answered Feb 28 at 10:23









                    GawainukGawainuk

                    29614




                    29614























                        0














                        Regular consumer routers save basic identifiers of devices that have been connected to it. Some routers, especially many of the newer ones, do allow basic logging of hostnames or sites visited based on DNS lookups, but usually not full URLs. Some can be configured to send periodic emails of the log. Depending on the router, it may be possible to unplug it to clear the log. If you know how big your router's log is, and you know that email is turned off, you could try to get rid of the old log data by visiting lots of random websites. ISPs generally do not keep logs, at least not logs that they share. Their main concern is with spam being generated from infected customer hosts within their network.



                        The NSA does log everything that they can, and this might be used against you in the future.



                        If you do know that logs were kept, then you better act fast and invite some friends over so that they can be blamed for the naughty sites, and set up a temporary Tor exit node or other public proxy on your computer so that you can blame it on that. This is only if the situation is serious.






                        share|improve this answer






























                          0














                          Regular consumer routers save basic identifiers of devices that have been connected to it. Some routers, especially many of the newer ones, do allow basic logging of hostnames or sites visited based on DNS lookups, but usually not full URLs. Some can be configured to send periodic emails of the log. Depending on the router, it may be possible to unplug it to clear the log. If you know how big your router's log is, and you know that email is turned off, you could try to get rid of the old log data by visiting lots of random websites. ISPs generally do not keep logs, at least not logs that they share. Their main concern is with spam being generated from infected customer hosts within their network.



                          The NSA does log everything that they can, and this might be used against you in the future.



                          If you do know that logs were kept, then you better act fast and invite some friends over so that they can be blamed for the naughty sites, and set up a temporary Tor exit node or other public proxy on your computer so that you can blame it on that. This is only if the situation is serious.






                          share|improve this answer




























                            0












                            0








                            0







                            Regular consumer routers save basic identifiers of devices that have been connected to it. Some routers, especially many of the newer ones, do allow basic logging of hostnames or sites visited based on DNS lookups, but usually not full URLs. Some can be configured to send periodic emails of the log. Depending on the router, it may be possible to unplug it to clear the log. If you know how big your router's log is, and you know that email is turned off, you could try to get rid of the old log data by visiting lots of random websites. ISPs generally do not keep logs, at least not logs that they share. Their main concern is with spam being generated from infected customer hosts within their network.



                            The NSA does log everything that they can, and this might be used against you in the future.



                            If you do know that logs were kept, then you better act fast and invite some friends over so that they can be blamed for the naughty sites, and set up a temporary Tor exit node or other public proxy on your computer so that you can blame it on that. This is only if the situation is serious.






                            share|improve this answer















                            Regular consumer routers save basic identifiers of devices that have been connected to it. Some routers, especially many of the newer ones, do allow basic logging of hostnames or sites visited based on DNS lookups, but usually not full URLs. Some can be configured to send periodic emails of the log. Depending on the router, it may be possible to unplug it to clear the log. If you know how big your router's log is, and you know that email is turned off, you could try to get rid of the old log data by visiting lots of random websites. ISPs generally do not keep logs, at least not logs that they share. Their main concern is with spam being generated from infected customer hosts within their network.



                            The NSA does log everything that they can, and this might be used against you in the future.



                            If you do know that logs were kept, then you better act fast and invite some friends over so that they can be blamed for the naughty sites, and set up a temporary Tor exit node or other public proxy on your computer so that you can blame it on that. This is only if the situation is serious.







                            share|improve this answer














                            share|improve this answer



                            share|improve this answer








                            edited 14 hours ago









                            forest

                            37.1k17120132




                            37.1k17120132










                            answered 2 days ago









                            Alex CannonAlex Cannon

                            31316




                            31316

















                                protected by Community yesterday



                                Thank you for your interest in this question.
                                Because it has attracted low-quality or spam answers that had to be removed, posting an answer now requires 10 reputation on this site (the association bonus does not count).



                                Would you like to answer one of these unanswered questions instead?



                                Popular posts from this blog

                                El tren de la libertad Índice Antecedentes "Porque yo decido" Desarrollo de la...

                                Puerta de Hutt Referencias Enlaces externos Menú de navegación15°58′00″S 5°42′00″O /...

                                Castillo d'Acher Características Menú de navegación