If I delete my router's history can my ISP still provide it to my parents?If I use a VPN, who will resolve my...
Connecting top and bottom of adjacent circles
When does coming up with an idea constitute sufficient contribution for authorship?
Numbers of Exaggeration in Talmud
Why didn't Eru and/or the Valar intervene when Sauron corrupted Númenor?
The terminology for an excluded solution
Finding the number of integers that are a square and a cube at the same time
What is better: yes / no radio, or simple checkbox?
Does Windows 10's telemetry include sending *.doc files if Word crashed?
How would an AI self awareness kill switch work?
How to avoid being sexist when trying to employ someone to function in a very sexist environment?
How can I improve my fireworks photography?
Could be quantum mechanics necessary to analyze some biology scenarios?
Math reviews in "Zentralblatt für Mathematik und ihre Grenzgebiete"
I am on the US no-fly list. What can I do in order to be allowed on flights which go through US airspace?
Dilemma of explaining to interviewer that he is the reason for declining second interview
Meaning of ご休憩一時間コース
How to approximate rolls for potions of healing using only d6's?
Discrepancy in P/E ratio of stocks in Robinhood app?
Why did Bush enact a completely different foreign policy to that which he espoused during the 2000 Presidential election campaign?
How to acknowledge an embarrassing job interview, now that I work directly with the interviewer?
What kind of hardware implements Fourier transform?
Which preposition to use with beauty? Of or with?
Why is c4 a better move in this position?
How to properly claim credit for peer review?
If I delete my router's history can my ISP still provide it to my parents?
If I use a VPN, who will resolve my DNS requests?Will an ISP give out network/traffic info upon request?How can mom monitor my internet history from a distance?My ISP uses deep packet inspection; what can they observe?Hiding or Obscuring Data from ISPsHow can Chromium access my Firefox history?Can my isp see what I legitimately download?Can my ISP provide my parents with what sites I visit?can a malware conceal true browser historyDoes your ISP know your router's name?Can VPN prevent ISP from tracking?How can a router or my ISP protect against phishing?
If I delete my router's history, is it still visible and can my ISP still provide it to my parents?
Or is it deleted from existence?
privacy router isp
New contributor
|
show 15 more comments
If I delete my router's history, is it still visible and can my ISP still provide it to my parents?
Or is it deleted from existence?
privacy router isp
New contributor
12
If you're that worried, employ incognito mode, only use DuckDuckGo (or similar) as your search engine and always browse using a VPN.
– NeepNeepNeep
Feb 27 at 15:09
79
Are there consumer-grade routers that store any history by default?
– JPhi1618
Feb 27 at 18:11
17
@NeepNeepNeep "If you're that worried, employ incognito mode, only use DuckDuckGo (or similar) as your search engine and always browse using a VPN"... none of which helps him out. The OP asked at the ISP. The ISP would still have that info... and even the VPN only helps to a point -- because DNS requests are still exposed.
– MGoBlue93
Feb 27 at 23:31
59
@MGoBlue93 That is incorrect. A properly configured VPN for privacy from your ISP will not expose DNS requests. Everything, including DNS, goes through the VPN.
– forest
Feb 28 at 2:12
22
@MGoBlue93 "A or not A" are two binary choices. Forest specified a properly configured VPN for their answer, your comment says a VPN can only help to a point. Sure, there are infinite ways to not properly configure a VPN and thousands of VPNs that don't provide automatic proper configurations, but if the VPN is properly configured, then DNS requests are not exposed. Also, Forest did not attack you, they pointed out an error. Attacking is what you are doing by directing an insult at Forest (calling that person uneducated), and claiming they are attacking you.
– Davy M
Feb 28 at 18:18
|
show 15 more comments
If I delete my router's history, is it still visible and can my ISP still provide it to my parents?
Or is it deleted from existence?
privacy router isp
New contributor
If I delete my router's history, is it still visible and can my ISP still provide it to my parents?
Or is it deleted from existence?
privacy router isp
privacy router isp
New contributor
New contributor
edited Feb 27 at 15:13
Glorfindel
1,1812821
1,1812821
New contributor
asked Feb 27 at 12:28
madurmadur
258123
258123
New contributor
New contributor
12
If you're that worried, employ incognito mode, only use DuckDuckGo (or similar) as your search engine and always browse using a VPN.
– NeepNeepNeep
Feb 27 at 15:09
79
Are there consumer-grade routers that store any history by default?
– JPhi1618
Feb 27 at 18:11
17
@NeepNeepNeep "If you're that worried, employ incognito mode, only use DuckDuckGo (or similar) as your search engine and always browse using a VPN"... none of which helps him out. The OP asked at the ISP. The ISP would still have that info... and even the VPN only helps to a point -- because DNS requests are still exposed.
– MGoBlue93
Feb 27 at 23:31
59
@MGoBlue93 That is incorrect. A properly configured VPN for privacy from your ISP will not expose DNS requests. Everything, including DNS, goes through the VPN.
– forest
Feb 28 at 2:12
22
@MGoBlue93 "A or not A" are two binary choices. Forest specified a properly configured VPN for their answer, your comment says a VPN can only help to a point. Sure, there are infinite ways to not properly configure a VPN and thousands of VPNs that don't provide automatic proper configurations, but if the VPN is properly configured, then DNS requests are not exposed. Also, Forest did not attack you, they pointed out an error. Attacking is what you are doing by directing an insult at Forest (calling that person uneducated), and claiming they are attacking you.
– Davy M
Feb 28 at 18:18
|
show 15 more comments
12
If you're that worried, employ incognito mode, only use DuckDuckGo (or similar) as your search engine and always browse using a VPN.
– NeepNeepNeep
Feb 27 at 15:09
79
Are there consumer-grade routers that store any history by default?
– JPhi1618
Feb 27 at 18:11
17
@NeepNeepNeep "If you're that worried, employ incognito mode, only use DuckDuckGo (or similar) as your search engine and always browse using a VPN"... none of which helps him out. The OP asked at the ISP. The ISP would still have that info... and even the VPN only helps to a point -- because DNS requests are still exposed.
– MGoBlue93
Feb 27 at 23:31
59
@MGoBlue93 That is incorrect. A properly configured VPN for privacy from your ISP will not expose DNS requests. Everything, including DNS, goes through the VPN.
– forest
Feb 28 at 2:12
22
@MGoBlue93 "A or not A" are two binary choices. Forest specified a properly configured VPN for their answer, your comment says a VPN can only help to a point. Sure, there are infinite ways to not properly configure a VPN and thousands of VPNs that don't provide automatic proper configurations, but if the VPN is properly configured, then DNS requests are not exposed. Also, Forest did not attack you, they pointed out an error. Attacking is what you are doing by directing an insult at Forest (calling that person uneducated), and claiming they are attacking you.
– Davy M
Feb 28 at 18:18
12
12
If you're that worried, employ incognito mode, only use DuckDuckGo (or similar) as your search engine and always browse using a VPN.
– NeepNeepNeep
Feb 27 at 15:09
If you're that worried, employ incognito mode, only use DuckDuckGo (or similar) as your search engine and always browse using a VPN.
– NeepNeepNeep
Feb 27 at 15:09
79
79
Are there consumer-grade routers that store any history by default?
– JPhi1618
Feb 27 at 18:11
Are there consumer-grade routers that store any history by default?
– JPhi1618
Feb 27 at 18:11
17
17
@NeepNeepNeep "If you're that worried, employ incognito mode, only use DuckDuckGo (or similar) as your search engine and always browse using a VPN"... none of which helps him out. The OP asked at the ISP. The ISP would still have that info... and even the VPN only helps to a point -- because DNS requests are still exposed.
– MGoBlue93
Feb 27 at 23:31
@NeepNeepNeep "If you're that worried, employ incognito mode, only use DuckDuckGo (or similar) as your search engine and always browse using a VPN"... none of which helps him out. The OP asked at the ISP. The ISP would still have that info... and even the VPN only helps to a point -- because DNS requests are still exposed.
– MGoBlue93
Feb 27 at 23:31
59
59
@MGoBlue93 That is incorrect. A properly configured VPN for privacy from your ISP will not expose DNS requests. Everything, including DNS, goes through the VPN.
– forest
Feb 28 at 2:12
@MGoBlue93 That is incorrect. A properly configured VPN for privacy from your ISP will not expose DNS requests. Everything, including DNS, goes through the VPN.
– forest
Feb 28 at 2:12
22
22
@MGoBlue93 "A or not A" are two binary choices. Forest specified a properly configured VPN for their answer, your comment says a VPN can only help to a point. Sure, there are infinite ways to not properly configure a VPN and thousands of VPNs that don't provide automatic proper configurations, but if the VPN is properly configured, then DNS requests are not exposed. Also, Forest did not attack you, they pointed out an error. Attacking is what you are doing by directing an insult at Forest (calling that person uneducated), and claiming they are attacking you.
– Davy M
Feb 28 at 18:18
@MGoBlue93 "A or not A" are two binary choices. Forest specified a properly configured VPN for their answer, your comment says a VPN can only help to a point. Sure, there are infinite ways to not properly configure a VPN and thousands of VPNs that don't provide automatic proper configurations, but if the VPN is properly configured, then DNS requests are not exposed. Also, Forest did not attack you, they pointed out an error. Attacking is what you are doing by directing an insult at Forest (calling that person uneducated), and claiming they are attacking you.
– Davy M
Feb 28 at 18:18
|
show 15 more comments
8 Answers
8
active
oldest
votes
If I delete my router's history, is it still visible and can my ISP still provide it to my parents? Or is it deleted from existence?
Your ISP's record of your network usage isn't in any way affected by you doing anything to your router. You could wipe its memory, subject it to an EMP, and crush its chips to dust, and it wouldn't have any effect on them. :-) They maintain their own logs, which you cannot delete.
Whether your ISP will provide that information to your parents is another question, I expect it varies by locale/jurisdiction and possibly ISP.
You can make it (nearly) impossible for your ISP to know what sites you're visiting by using Tor or similar. The project includes Tor Browser, based on Firefox ESR, which makes it really easy to browse over Tor. You can also use the Brave browser (no affiliation), based on the Chromium project, in its "Private window with Tor" mode. This is not user-configuring a browser for Tor (which the Tor project advises against, it's too easy to miss out important things), it's a browser from privacy-obsessed people with a Tor-enabled private browsing mode. Both Tor Browser and Brave have trade-offs, see this tweet thread (in particular the replies from Tom Lowenthal, their Security & Privacy PM). Some people say "You should never browse with Tor with anything but Tor Browser" but it's more nuanced than that.
New contributor
Comments are not for extended discussion; this conversation has been moved to chat.
– Rory Alsop♦
yesterday
Please note that Brave browser has vastly inferior fingerprinting resistance compared to Tor browser. While the mere use of Tor is sufficient to avoid ISP-level sniffing, the use of an alternate browser like Brave makes it possible for the websites you visit to uniquely identify your computer across visits.
– forest
14 hours ago
@forest - That discussion has already been moved to chat once. It's not useful to start it here again. Separately: You've been asked before for citations to back up your claims and still haven't provided any. Please do so (in the chat).
– T.J. Crowder
8 hours ago
add a comment |
Routers usually do not store history and ISPs, while they may record such things on internal logs, do not give them out to anyone without a court order. You do not need to worry about your parents finding the naughty sites you visited unless it's in your browser history. Just turn on incognito mode and don't worry.
While it is theoretically possible that some ISPs may have a child-safe mode where they record and even report visited sites to the account holders, I have never heard of this happening. It would also be fraught with legal risks, so it is unlikely to be a realistic threat. If you are worried about that threat, you can use a VPN or Tor to encrypt the connection going through your ISP so they cannot log anything.
66
I don’t think that’s a safe assumption. The ISP might turn over records of an account’s activity to the legitimate account holder without a court order.
– John Deters
Feb 27 at 15:52
15
If the OP's parents are the account holder it's perfectly reasonable for the ISP to give them log data, since it is their data.
– NathanOliver
Feb 27 at 17:21
4
@NathanOliver Wouldn't that depend on jurisdictions pretty heavily? I assume GDPR would cover that; but in other places, is there anything that actually suggests the data they legally collect about you is still "yours"?
– JMac
Feb 27 at 17:37
3
@JMac Why would the GDPR apply here? What websites were visited from an IP doesn't seem "personal data" and would certainly be covered by pseudonymisation no?
– Voo
Feb 27 at 18:56
7
@Voo I'm pretty sure that IP address plus date and time counts as personally identifiable data under the GDPR. Even if it doesn't actually, it's certainly borderline enough that any DPO worth their salt should advice strong caution.
– a CVn
Feb 27 at 21:17
|
show 8 more comments
ISPs can absolutely log traffic upstream from your router.
The easiest way for an ISP to inspect what users are doing is by inspecting logged dns queries. People can get around this by using non ISP dns servers such as 1.1.1.1 (cloudflare dns) or 8.8.8.8 (google dns)
The next easiest is to actually log connections. To get around this, people use VPN or an onion router such as Tor. This causes the traffic to all go out over a single encrypted tunnel (or in the case of tor many encrypted tunnels) till it leaves the network owned by the snoopers. The Opera browser now includes free ephemeral VPN. If you wanted to build your own openvpn server in the cloud there are some setup scripts on github. If you live under a repressive government they will try to block or disrupt VPN traffic (note to representatives of repressive governments, privacy is necessary for information security and basic human dignity). In that case you may wish to explore shadowsocks.
Do be aware that most free VPN services fund their operation by monetizing your traffic data. This means they actively collect and actively sell your connection data. This might be preferable to being watched by people who know you, but do keep it in mind.
Opera VPN + cloudflare DNS should provide privacy ISP from account owners. Do be aware of local cached data (incognito mode is your friend here). Tor works too. Keep in mind that Tor traffic has a distinctive fingerprint. Network administrators who are interested in who might be doing illegal things can watch for that traffic. There was a report recently of a college student who sent a threatening email in order to delay an exam. The network administrators simply checked network logs for who on campus was using Tor during the minute the email was received and then said student received a knock, some new chrome bracelets and didn't have to worry about exams anymore.
1
VPN traffic also has a pretty significant fingerprint, so if someone is logging DPI data they can just as easily look for signs of VPN traffic as for signs of Tor traffic. As for Tor, someone said (I think it was in a DEFCON presentation) that it is designed to make Tor users look alike, not make Tor users look like non-Tor users. Tor offers anonymity, not privacy or confidentiality (and if the baseband traffic is unencrypted and/or unauthenticated, it's actually probably easier to track people who are using Tor, and mess with their traffic, due to the relatively small number of exit nodes).
– a CVn
Feb 27 at 21:22
"VPN traffic also has a pretty significant fingerprint," Plus, DNS requests are NOT encrypted by the VPN... that's how Big Tech works around not having access to cookies and such; they infer data about you from lookups.
– MGoBlue93
Feb 27 at 23:35
Regarding previous comments. Absolutely, VPN traffic has a distinctive fingerprint. It often uses distinctive TCP or UDP ports (VPN comes in a handful of varieties). Even when it uses a common port such as 443 it has distinctive characteristics. We know this because the great firewall of china is able to block and/or degrade SSL VPN traffic. I'd further suggest though that there are many common and legitimate uses of VPN so most network admins don't flag it for review. I would say Tor traffic is far less likely to fly under the radar.
– jorfus
Feb 28 at 18:25
I'm not sure if it matters enough, you should consider mentioning that an ISP could inspect your DNS traffic to 1.1.1.1 (or others) as well. It requires DPI on their end, but is feasible enough that they may decide to implement it. Also, if you are using a VPN, ideally your DNS will be routed through the tunnel as well, so the choice of which DNS provider you use matters less (in terms of ISP snooping at least).
– Vidia
2 days ago
@Vidia some DNS providers, such as 1.1.1.1 or 8.8.8.8 implement DNS-over-HTTPS. Your ISP may still know which websites you are visiting through other means (eg. TLS-SNI) but your DNS requests should be safe from eavesdroppers.
– Droplet
2 days ago
|
show 1 more comment
Your parents will not normally have the authority to retrieve data from the ISP.
An ISP does not offer this type of information on request. You need some type of government warrant before they're released, and the process is non-trivial.
If you're worried about pr0n and simply silly stuff, then don't worry about it.
If you're Dread Pirate Roberts v2.0, and am asking on Stack Exchange for answers... this is a VERY ironic turn of events... since v1.0 was busted via Stack Exchange!
2
Thanks to the current FCC, ISPs are legally able to sell anyone's browser history--they just won't sell to commonfolk.
– Amalgovinus
yesterday
add a comment |
When you erase the router history, you are hiding which device connected to your router stablished the communication.
The ISP still knows and stores the traffic that outcomes from your router to internet.
To hide traffic to your parents, any secured VPN should be enough:
Your ISP will know your are connected to a VPN but not the real traffic. On the other hand, the VPN provider will know the traffic, but in most cases not the origin
So, your parents will need both pieces (ISP & VPN provider) to solve the puzzle. In this way, unless they are federal I think your privacy should be safe.
If you want to play next level, as suggested in previous answers use Tor.
New contributor
This answer is difficult to read and doesn't seem to provide any new / useful information.
– Qwertie
Feb 27 at 22:53
2
1. using TOR is not forensics-proof... I know you're using TOR by looking at logs and 2. TOR exposes the OP to a whole different level of abuse.
– MGoBlue93
Feb 27 at 23:45
@MGoBlue93 It's Tor, not TOR. And if you want to make it difficult to discover the use of Tor, you can use a bridge relay with pluggable transports. That obfuscates the protocol to prevent an ISP from realizing you are using Tor. It is especially useful if your ISP or government tries to censor the Tor network.
– forest
14 hours ago
add a comment |
Any website you browsed will be saved in ISP software (ex: MikroTik) which shows IP address, time and browsed url. If you have multiple devices running on same internet connection, even then information is going to be saved in ISP logs.
Only way to hide websites you are using is by securing.
- VPN: When something is browsed using any browser, first it goes through your internet connection to website which you are looking for but using VPN, first it goes from your internet connection to VPN IP address, then the website you are browsing. At this time your ISP will not be able to log whatever you are browsing, neither google nor any search engine will be able to log your data as they see VPN's IP address than yours.
- Firefox Private Browsing or Chrome Incognito prevent history and browsing data from being saved on the computer you’re using, but if there is in fact a piece of network hardware monitoring connections, using these browser features will not help.
- Browsec: Its a plugin/extension in firefox & chrome which works as VPN. You can use this if you want only your browser data to be hidden or secured.
New contributor
add a comment |
In answer to the OP's actual questions.
Yes, it is still visible and not deleted from existence.
So anything you have looked at will be available for your ISP to deliver to the account holder or law enforcement/government agencies etc.
Now if you want to stop the data being so easy to gather, (not impossible but shall we say financially restrictive) look at the other answers which show you some good ways of providing deniability, note I do not say you could hide you were up to something. If your parents say you've been using Tor or a VPN you can always say it was to look at TV shows that were restricted in your country rather then searching for well whatever triggered your original question.
Also don't use incognito mode it hides nothing from your ISP it only stops the local browser from storing your browser history.
add a comment |
Regular consumer routers save basic identifiers of devices that have been connected to it. Some routers, especially many of the newer ones, do allow basic logging of hostnames or sites visited based on DNS lookups, but usually not full URLs. Some can be configured to send periodic emails of the log. Depending on the router, it may be possible to unplug it to clear the log. If you know how big your router's log is, and you know that email is turned off, you could try to get rid of the old log data by visiting lots of random websites. ISPs generally do not keep logs, at least not logs that they share. Their main concern is with spam being generated from infected customer hosts within their network.
The NSA does log everything that they can, and this might be used against you in the future.
If you do know that logs were kept, then you better act fast and invite some friends over so that they can be blamed for the naughty sites, and set up a temporary Tor exit node or other public proxy on your computer so that you can blame it on that. This is only if the situation is serious.
add a comment |
protected by Community♦ yesterday
Thank you for your interest in this question.
Because it has attracted low-quality or spam answers that had to be removed, posting an answer now requires 10 reputation on this site (the association bonus does not count).
Would you like to answer one of these unanswered questions instead?
8 Answers
8
active
oldest
votes
8 Answers
8
active
oldest
votes
active
oldest
votes
active
oldest
votes
If I delete my router's history, is it still visible and can my ISP still provide it to my parents? Or is it deleted from existence?
Your ISP's record of your network usage isn't in any way affected by you doing anything to your router. You could wipe its memory, subject it to an EMP, and crush its chips to dust, and it wouldn't have any effect on them. :-) They maintain their own logs, which you cannot delete.
Whether your ISP will provide that information to your parents is another question, I expect it varies by locale/jurisdiction and possibly ISP.
You can make it (nearly) impossible for your ISP to know what sites you're visiting by using Tor or similar. The project includes Tor Browser, based on Firefox ESR, which makes it really easy to browse over Tor. You can also use the Brave browser (no affiliation), based on the Chromium project, in its "Private window with Tor" mode. This is not user-configuring a browser for Tor (which the Tor project advises against, it's too easy to miss out important things), it's a browser from privacy-obsessed people with a Tor-enabled private browsing mode. Both Tor Browser and Brave have trade-offs, see this tweet thread (in particular the replies from Tom Lowenthal, their Security & Privacy PM). Some people say "You should never browse with Tor with anything but Tor Browser" but it's more nuanced than that.
New contributor
Comments are not for extended discussion; this conversation has been moved to chat.
– Rory Alsop♦
yesterday
Please note that Brave browser has vastly inferior fingerprinting resistance compared to Tor browser. While the mere use of Tor is sufficient to avoid ISP-level sniffing, the use of an alternate browser like Brave makes it possible for the websites you visit to uniquely identify your computer across visits.
– forest
14 hours ago
@forest - That discussion has already been moved to chat once. It's not useful to start it here again. Separately: You've been asked before for citations to back up your claims and still haven't provided any. Please do so (in the chat).
– T.J. Crowder
8 hours ago
add a comment |
If I delete my router's history, is it still visible and can my ISP still provide it to my parents? Or is it deleted from existence?
Your ISP's record of your network usage isn't in any way affected by you doing anything to your router. You could wipe its memory, subject it to an EMP, and crush its chips to dust, and it wouldn't have any effect on them. :-) They maintain their own logs, which you cannot delete.
Whether your ISP will provide that information to your parents is another question, I expect it varies by locale/jurisdiction and possibly ISP.
You can make it (nearly) impossible for your ISP to know what sites you're visiting by using Tor or similar. The project includes Tor Browser, based on Firefox ESR, which makes it really easy to browse over Tor. You can also use the Brave browser (no affiliation), based on the Chromium project, in its "Private window with Tor" mode. This is not user-configuring a browser for Tor (which the Tor project advises against, it's too easy to miss out important things), it's a browser from privacy-obsessed people with a Tor-enabled private browsing mode. Both Tor Browser and Brave have trade-offs, see this tweet thread (in particular the replies from Tom Lowenthal, their Security & Privacy PM). Some people say "You should never browse with Tor with anything but Tor Browser" but it's more nuanced than that.
New contributor
Comments are not for extended discussion; this conversation has been moved to chat.
– Rory Alsop♦
yesterday
Please note that Brave browser has vastly inferior fingerprinting resistance compared to Tor browser. While the mere use of Tor is sufficient to avoid ISP-level sniffing, the use of an alternate browser like Brave makes it possible for the websites you visit to uniquely identify your computer across visits.
– forest
14 hours ago
@forest - That discussion has already been moved to chat once. It's not useful to start it here again. Separately: You've been asked before for citations to back up your claims and still haven't provided any. Please do so (in the chat).
– T.J. Crowder
8 hours ago
add a comment |
If I delete my router's history, is it still visible and can my ISP still provide it to my parents? Or is it deleted from existence?
Your ISP's record of your network usage isn't in any way affected by you doing anything to your router. You could wipe its memory, subject it to an EMP, and crush its chips to dust, and it wouldn't have any effect on them. :-) They maintain their own logs, which you cannot delete.
Whether your ISP will provide that information to your parents is another question, I expect it varies by locale/jurisdiction and possibly ISP.
You can make it (nearly) impossible for your ISP to know what sites you're visiting by using Tor or similar. The project includes Tor Browser, based on Firefox ESR, which makes it really easy to browse over Tor. You can also use the Brave browser (no affiliation), based on the Chromium project, in its "Private window with Tor" mode. This is not user-configuring a browser for Tor (which the Tor project advises against, it's too easy to miss out important things), it's a browser from privacy-obsessed people with a Tor-enabled private browsing mode. Both Tor Browser and Brave have trade-offs, see this tweet thread (in particular the replies from Tom Lowenthal, their Security & Privacy PM). Some people say "You should never browse with Tor with anything but Tor Browser" but it's more nuanced than that.
New contributor
If I delete my router's history, is it still visible and can my ISP still provide it to my parents? Or is it deleted from existence?
Your ISP's record of your network usage isn't in any way affected by you doing anything to your router. You could wipe its memory, subject it to an EMP, and crush its chips to dust, and it wouldn't have any effect on them. :-) They maintain their own logs, which you cannot delete.
Whether your ISP will provide that information to your parents is another question, I expect it varies by locale/jurisdiction and possibly ISP.
You can make it (nearly) impossible for your ISP to know what sites you're visiting by using Tor or similar. The project includes Tor Browser, based on Firefox ESR, which makes it really easy to browse over Tor. You can also use the Brave browser (no affiliation), based on the Chromium project, in its "Private window with Tor" mode. This is not user-configuring a browser for Tor (which the Tor project advises against, it's too easy to miss out important things), it's a browser from privacy-obsessed people with a Tor-enabled private browsing mode. Both Tor Browser and Brave have trade-offs, see this tweet thread (in particular the replies from Tom Lowenthal, their Security & Privacy PM). Some people say "You should never browse with Tor with anything but Tor Browser" but it's more nuanced than that.
New contributor
edited yesterday
New contributor
answered Feb 27 at 15:17
T.J. CrowderT.J. Crowder
855156
855156
New contributor
New contributor
Comments are not for extended discussion; this conversation has been moved to chat.
– Rory Alsop♦
yesterday
Please note that Brave browser has vastly inferior fingerprinting resistance compared to Tor browser. While the mere use of Tor is sufficient to avoid ISP-level sniffing, the use of an alternate browser like Brave makes it possible for the websites you visit to uniquely identify your computer across visits.
– forest
14 hours ago
@forest - That discussion has already been moved to chat once. It's not useful to start it here again. Separately: You've been asked before for citations to back up your claims and still haven't provided any. Please do so (in the chat).
– T.J. Crowder
8 hours ago
add a comment |
Comments are not for extended discussion; this conversation has been moved to chat.
– Rory Alsop♦
yesterday
Please note that Brave browser has vastly inferior fingerprinting resistance compared to Tor browser. While the mere use of Tor is sufficient to avoid ISP-level sniffing, the use of an alternate browser like Brave makes it possible for the websites you visit to uniquely identify your computer across visits.
– forest
14 hours ago
@forest - That discussion has already been moved to chat once. It's not useful to start it here again. Separately: You've been asked before for citations to back up your claims and still haven't provided any. Please do so (in the chat).
– T.J. Crowder
8 hours ago
Comments are not for extended discussion; this conversation has been moved to chat.
– Rory Alsop♦
yesterday
Comments are not for extended discussion; this conversation has been moved to chat.
– Rory Alsop♦
yesterday
Please note that Brave browser has vastly inferior fingerprinting resistance compared to Tor browser. While the mere use of Tor is sufficient to avoid ISP-level sniffing, the use of an alternate browser like Brave makes it possible for the websites you visit to uniquely identify your computer across visits.
– forest
14 hours ago
Please note that Brave browser has vastly inferior fingerprinting resistance compared to Tor browser. While the mere use of Tor is sufficient to avoid ISP-level sniffing, the use of an alternate browser like Brave makes it possible for the websites you visit to uniquely identify your computer across visits.
– forest
14 hours ago
@forest - That discussion has already been moved to chat once. It's not useful to start it here again. Separately: You've been asked before for citations to back up your claims and still haven't provided any. Please do so (in the chat).
– T.J. Crowder
8 hours ago
@forest - That discussion has already been moved to chat once. It's not useful to start it here again. Separately: You've been asked before for citations to back up your claims and still haven't provided any. Please do so (in the chat).
– T.J. Crowder
8 hours ago
add a comment |
Routers usually do not store history and ISPs, while they may record such things on internal logs, do not give them out to anyone without a court order. You do not need to worry about your parents finding the naughty sites you visited unless it's in your browser history. Just turn on incognito mode and don't worry.
While it is theoretically possible that some ISPs may have a child-safe mode where they record and even report visited sites to the account holders, I have never heard of this happening. It would also be fraught with legal risks, so it is unlikely to be a realistic threat. If you are worried about that threat, you can use a VPN or Tor to encrypt the connection going through your ISP so they cannot log anything.
66
I don’t think that’s a safe assumption. The ISP might turn over records of an account’s activity to the legitimate account holder without a court order.
– John Deters
Feb 27 at 15:52
15
If the OP's parents are the account holder it's perfectly reasonable for the ISP to give them log data, since it is their data.
– NathanOliver
Feb 27 at 17:21
4
@NathanOliver Wouldn't that depend on jurisdictions pretty heavily? I assume GDPR would cover that; but in other places, is there anything that actually suggests the data they legally collect about you is still "yours"?
– JMac
Feb 27 at 17:37
3
@JMac Why would the GDPR apply here? What websites were visited from an IP doesn't seem "personal data" and would certainly be covered by pseudonymisation no?
– Voo
Feb 27 at 18:56
7
@Voo I'm pretty sure that IP address plus date and time counts as personally identifiable data under the GDPR. Even if it doesn't actually, it's certainly borderline enough that any DPO worth their salt should advice strong caution.
– a CVn
Feb 27 at 21:17
|
show 8 more comments
Routers usually do not store history and ISPs, while they may record such things on internal logs, do not give them out to anyone without a court order. You do not need to worry about your parents finding the naughty sites you visited unless it's in your browser history. Just turn on incognito mode and don't worry.
While it is theoretically possible that some ISPs may have a child-safe mode where they record and even report visited sites to the account holders, I have never heard of this happening. It would also be fraught with legal risks, so it is unlikely to be a realistic threat. If you are worried about that threat, you can use a VPN or Tor to encrypt the connection going through your ISP so they cannot log anything.
66
I don’t think that’s a safe assumption. The ISP might turn over records of an account’s activity to the legitimate account holder without a court order.
– John Deters
Feb 27 at 15:52
15
If the OP's parents are the account holder it's perfectly reasonable for the ISP to give them log data, since it is their data.
– NathanOliver
Feb 27 at 17:21
4
@NathanOliver Wouldn't that depend on jurisdictions pretty heavily? I assume GDPR would cover that; but in other places, is there anything that actually suggests the data they legally collect about you is still "yours"?
– JMac
Feb 27 at 17:37
3
@JMac Why would the GDPR apply here? What websites were visited from an IP doesn't seem "personal data" and would certainly be covered by pseudonymisation no?
– Voo
Feb 27 at 18:56
7
@Voo I'm pretty sure that IP address plus date and time counts as personally identifiable data under the GDPR. Even if it doesn't actually, it's certainly borderline enough that any DPO worth their salt should advice strong caution.
– a CVn
Feb 27 at 21:17
|
show 8 more comments
Routers usually do not store history and ISPs, while they may record such things on internal logs, do not give them out to anyone without a court order. You do not need to worry about your parents finding the naughty sites you visited unless it's in your browser history. Just turn on incognito mode and don't worry.
While it is theoretically possible that some ISPs may have a child-safe mode where they record and even report visited sites to the account holders, I have never heard of this happening. It would also be fraught with legal risks, so it is unlikely to be a realistic threat. If you are worried about that threat, you can use a VPN or Tor to encrypt the connection going through your ISP so they cannot log anything.
Routers usually do not store history and ISPs, while they may record such things on internal logs, do not give them out to anyone without a court order. You do not need to worry about your parents finding the naughty sites you visited unless it's in your browser history. Just turn on incognito mode and don't worry.
While it is theoretically possible that some ISPs may have a child-safe mode where they record and even report visited sites to the account holders, I have never heard of this happening. It would also be fraught with legal risks, so it is unlikely to be a realistic threat. If you are worried about that threat, you can use a VPN or Tor to encrypt the connection going through your ISP so they cannot log anything.
edited 14 hours ago
answered Feb 27 at 12:35
forestforest
37.1k17120132
37.1k17120132
66
I don’t think that’s a safe assumption. The ISP might turn over records of an account’s activity to the legitimate account holder without a court order.
– John Deters
Feb 27 at 15:52
15
If the OP's parents are the account holder it's perfectly reasonable for the ISP to give them log data, since it is their data.
– NathanOliver
Feb 27 at 17:21
4
@NathanOliver Wouldn't that depend on jurisdictions pretty heavily? I assume GDPR would cover that; but in other places, is there anything that actually suggests the data they legally collect about you is still "yours"?
– JMac
Feb 27 at 17:37
3
@JMac Why would the GDPR apply here? What websites were visited from an IP doesn't seem "personal data" and would certainly be covered by pseudonymisation no?
– Voo
Feb 27 at 18:56
7
@Voo I'm pretty sure that IP address plus date and time counts as personally identifiable data under the GDPR. Even if it doesn't actually, it's certainly borderline enough that any DPO worth their salt should advice strong caution.
– a CVn
Feb 27 at 21:17
|
show 8 more comments
66
I don’t think that’s a safe assumption. The ISP might turn over records of an account’s activity to the legitimate account holder without a court order.
– John Deters
Feb 27 at 15:52
15
If the OP's parents are the account holder it's perfectly reasonable for the ISP to give them log data, since it is their data.
– NathanOliver
Feb 27 at 17:21
4
@NathanOliver Wouldn't that depend on jurisdictions pretty heavily? I assume GDPR would cover that; but in other places, is there anything that actually suggests the data they legally collect about you is still "yours"?
– JMac
Feb 27 at 17:37
3
@JMac Why would the GDPR apply here? What websites were visited from an IP doesn't seem "personal data" and would certainly be covered by pseudonymisation no?
– Voo
Feb 27 at 18:56
7
@Voo I'm pretty sure that IP address plus date and time counts as personally identifiable data under the GDPR. Even if it doesn't actually, it's certainly borderline enough that any DPO worth their salt should advice strong caution.
– a CVn
Feb 27 at 21:17
66
66
I don’t think that’s a safe assumption. The ISP might turn over records of an account’s activity to the legitimate account holder without a court order.
– John Deters
Feb 27 at 15:52
I don’t think that’s a safe assumption. The ISP might turn over records of an account’s activity to the legitimate account holder without a court order.
– John Deters
Feb 27 at 15:52
15
15
If the OP's parents are the account holder it's perfectly reasonable for the ISP to give them log data, since it is their data.
– NathanOliver
Feb 27 at 17:21
If the OP's parents are the account holder it's perfectly reasonable for the ISP to give them log data, since it is their data.
– NathanOliver
Feb 27 at 17:21
4
4
@NathanOliver Wouldn't that depend on jurisdictions pretty heavily? I assume GDPR would cover that; but in other places, is there anything that actually suggests the data they legally collect about you is still "yours"?
– JMac
Feb 27 at 17:37
@NathanOliver Wouldn't that depend on jurisdictions pretty heavily? I assume GDPR would cover that; but in other places, is there anything that actually suggests the data they legally collect about you is still "yours"?
– JMac
Feb 27 at 17:37
3
3
@JMac Why would the GDPR apply here? What websites were visited from an IP doesn't seem "personal data" and would certainly be covered by pseudonymisation no?
– Voo
Feb 27 at 18:56
@JMac Why would the GDPR apply here? What websites were visited from an IP doesn't seem "personal data" and would certainly be covered by pseudonymisation no?
– Voo
Feb 27 at 18:56
7
7
@Voo I'm pretty sure that IP address plus date and time counts as personally identifiable data under the GDPR. Even if it doesn't actually, it's certainly borderline enough that any DPO worth their salt should advice strong caution.
– a CVn
Feb 27 at 21:17
@Voo I'm pretty sure that IP address plus date and time counts as personally identifiable data under the GDPR. Even if it doesn't actually, it's certainly borderline enough that any DPO worth their salt should advice strong caution.
– a CVn
Feb 27 at 21:17
|
show 8 more comments
ISPs can absolutely log traffic upstream from your router.
The easiest way for an ISP to inspect what users are doing is by inspecting logged dns queries. People can get around this by using non ISP dns servers such as 1.1.1.1 (cloudflare dns) or 8.8.8.8 (google dns)
The next easiest is to actually log connections. To get around this, people use VPN or an onion router such as Tor. This causes the traffic to all go out over a single encrypted tunnel (or in the case of tor many encrypted tunnels) till it leaves the network owned by the snoopers. The Opera browser now includes free ephemeral VPN. If you wanted to build your own openvpn server in the cloud there are some setup scripts on github. If you live under a repressive government they will try to block or disrupt VPN traffic (note to representatives of repressive governments, privacy is necessary for information security and basic human dignity). In that case you may wish to explore shadowsocks.
Do be aware that most free VPN services fund their operation by monetizing your traffic data. This means they actively collect and actively sell your connection data. This might be preferable to being watched by people who know you, but do keep it in mind.
Opera VPN + cloudflare DNS should provide privacy ISP from account owners. Do be aware of local cached data (incognito mode is your friend here). Tor works too. Keep in mind that Tor traffic has a distinctive fingerprint. Network administrators who are interested in who might be doing illegal things can watch for that traffic. There was a report recently of a college student who sent a threatening email in order to delay an exam. The network administrators simply checked network logs for who on campus was using Tor during the minute the email was received and then said student received a knock, some new chrome bracelets and didn't have to worry about exams anymore.
1
VPN traffic also has a pretty significant fingerprint, so if someone is logging DPI data they can just as easily look for signs of VPN traffic as for signs of Tor traffic. As for Tor, someone said (I think it was in a DEFCON presentation) that it is designed to make Tor users look alike, not make Tor users look like non-Tor users. Tor offers anonymity, not privacy or confidentiality (and if the baseband traffic is unencrypted and/or unauthenticated, it's actually probably easier to track people who are using Tor, and mess with their traffic, due to the relatively small number of exit nodes).
– a CVn
Feb 27 at 21:22
"VPN traffic also has a pretty significant fingerprint," Plus, DNS requests are NOT encrypted by the VPN... that's how Big Tech works around not having access to cookies and such; they infer data about you from lookups.
– MGoBlue93
Feb 27 at 23:35
Regarding previous comments. Absolutely, VPN traffic has a distinctive fingerprint. It often uses distinctive TCP or UDP ports (VPN comes in a handful of varieties). Even when it uses a common port such as 443 it has distinctive characteristics. We know this because the great firewall of china is able to block and/or degrade SSL VPN traffic. I'd further suggest though that there are many common and legitimate uses of VPN so most network admins don't flag it for review. I would say Tor traffic is far less likely to fly under the radar.
– jorfus
Feb 28 at 18:25
I'm not sure if it matters enough, you should consider mentioning that an ISP could inspect your DNS traffic to 1.1.1.1 (or others) as well. It requires DPI on their end, but is feasible enough that they may decide to implement it. Also, if you are using a VPN, ideally your DNS will be routed through the tunnel as well, so the choice of which DNS provider you use matters less (in terms of ISP snooping at least).
– Vidia
2 days ago
@Vidia some DNS providers, such as 1.1.1.1 or 8.8.8.8 implement DNS-over-HTTPS. Your ISP may still know which websites you are visiting through other means (eg. TLS-SNI) but your DNS requests should be safe from eavesdroppers.
– Droplet
2 days ago
|
show 1 more comment
ISPs can absolutely log traffic upstream from your router.
The easiest way for an ISP to inspect what users are doing is by inspecting logged dns queries. People can get around this by using non ISP dns servers such as 1.1.1.1 (cloudflare dns) or 8.8.8.8 (google dns)
The next easiest is to actually log connections. To get around this, people use VPN or an onion router such as Tor. This causes the traffic to all go out over a single encrypted tunnel (or in the case of tor many encrypted tunnels) till it leaves the network owned by the snoopers. The Opera browser now includes free ephemeral VPN. If you wanted to build your own openvpn server in the cloud there are some setup scripts on github. If you live under a repressive government they will try to block or disrupt VPN traffic (note to representatives of repressive governments, privacy is necessary for information security and basic human dignity). In that case you may wish to explore shadowsocks.
Do be aware that most free VPN services fund their operation by monetizing your traffic data. This means they actively collect and actively sell your connection data. This might be preferable to being watched by people who know you, but do keep it in mind.
Opera VPN + cloudflare DNS should provide privacy ISP from account owners. Do be aware of local cached data (incognito mode is your friend here). Tor works too. Keep in mind that Tor traffic has a distinctive fingerprint. Network administrators who are interested in who might be doing illegal things can watch for that traffic. There was a report recently of a college student who sent a threatening email in order to delay an exam. The network administrators simply checked network logs for who on campus was using Tor during the minute the email was received and then said student received a knock, some new chrome bracelets and didn't have to worry about exams anymore.
1
VPN traffic also has a pretty significant fingerprint, so if someone is logging DPI data they can just as easily look for signs of VPN traffic as for signs of Tor traffic. As for Tor, someone said (I think it was in a DEFCON presentation) that it is designed to make Tor users look alike, not make Tor users look like non-Tor users. Tor offers anonymity, not privacy or confidentiality (and if the baseband traffic is unencrypted and/or unauthenticated, it's actually probably easier to track people who are using Tor, and mess with their traffic, due to the relatively small number of exit nodes).
– a CVn
Feb 27 at 21:22
"VPN traffic also has a pretty significant fingerprint," Plus, DNS requests are NOT encrypted by the VPN... that's how Big Tech works around not having access to cookies and such; they infer data about you from lookups.
– MGoBlue93
Feb 27 at 23:35
Regarding previous comments. Absolutely, VPN traffic has a distinctive fingerprint. It often uses distinctive TCP or UDP ports (VPN comes in a handful of varieties). Even when it uses a common port such as 443 it has distinctive characteristics. We know this because the great firewall of china is able to block and/or degrade SSL VPN traffic. I'd further suggest though that there are many common and legitimate uses of VPN so most network admins don't flag it for review. I would say Tor traffic is far less likely to fly under the radar.
– jorfus
Feb 28 at 18:25
I'm not sure if it matters enough, you should consider mentioning that an ISP could inspect your DNS traffic to 1.1.1.1 (or others) as well. It requires DPI on their end, but is feasible enough that they may decide to implement it. Also, if you are using a VPN, ideally your DNS will be routed through the tunnel as well, so the choice of which DNS provider you use matters less (in terms of ISP snooping at least).
– Vidia
2 days ago
@Vidia some DNS providers, such as 1.1.1.1 or 8.8.8.8 implement DNS-over-HTTPS. Your ISP may still know which websites you are visiting through other means (eg. TLS-SNI) but your DNS requests should be safe from eavesdroppers.
– Droplet
2 days ago
|
show 1 more comment
ISPs can absolutely log traffic upstream from your router.
The easiest way for an ISP to inspect what users are doing is by inspecting logged dns queries. People can get around this by using non ISP dns servers such as 1.1.1.1 (cloudflare dns) or 8.8.8.8 (google dns)
The next easiest is to actually log connections. To get around this, people use VPN or an onion router such as Tor. This causes the traffic to all go out over a single encrypted tunnel (or in the case of tor many encrypted tunnels) till it leaves the network owned by the snoopers. The Opera browser now includes free ephemeral VPN. If you wanted to build your own openvpn server in the cloud there are some setup scripts on github. If you live under a repressive government they will try to block or disrupt VPN traffic (note to representatives of repressive governments, privacy is necessary for information security and basic human dignity). In that case you may wish to explore shadowsocks.
Do be aware that most free VPN services fund their operation by monetizing your traffic data. This means they actively collect and actively sell your connection data. This might be preferable to being watched by people who know you, but do keep it in mind.
Opera VPN + cloudflare DNS should provide privacy ISP from account owners. Do be aware of local cached data (incognito mode is your friend here). Tor works too. Keep in mind that Tor traffic has a distinctive fingerprint. Network administrators who are interested in who might be doing illegal things can watch for that traffic. There was a report recently of a college student who sent a threatening email in order to delay an exam. The network administrators simply checked network logs for who on campus was using Tor during the minute the email was received and then said student received a knock, some new chrome bracelets and didn't have to worry about exams anymore.
ISPs can absolutely log traffic upstream from your router.
The easiest way for an ISP to inspect what users are doing is by inspecting logged dns queries. People can get around this by using non ISP dns servers such as 1.1.1.1 (cloudflare dns) or 8.8.8.8 (google dns)
The next easiest is to actually log connections. To get around this, people use VPN or an onion router such as Tor. This causes the traffic to all go out over a single encrypted tunnel (or in the case of tor many encrypted tunnels) till it leaves the network owned by the snoopers. The Opera browser now includes free ephemeral VPN. If you wanted to build your own openvpn server in the cloud there are some setup scripts on github. If you live under a repressive government they will try to block or disrupt VPN traffic (note to representatives of repressive governments, privacy is necessary for information security and basic human dignity). In that case you may wish to explore shadowsocks.
Do be aware that most free VPN services fund their operation by monetizing your traffic data. This means they actively collect and actively sell your connection data. This might be preferable to being watched by people who know you, but do keep it in mind.
Opera VPN + cloudflare DNS should provide privacy ISP from account owners. Do be aware of local cached data (incognito mode is your friend here). Tor works too. Keep in mind that Tor traffic has a distinctive fingerprint. Network administrators who are interested in who might be doing illegal things can watch for that traffic. There was a report recently of a college student who sent a threatening email in order to delay an exam. The network administrators simply checked network logs for who on campus was using Tor during the minute the email was received and then said student received a knock, some new chrome bracelets and didn't have to worry about exams anymore.
edited Feb 27 at 19:49
answered Feb 27 at 17:47
jorfusjorfus
32126
32126
1
VPN traffic also has a pretty significant fingerprint, so if someone is logging DPI data they can just as easily look for signs of VPN traffic as for signs of Tor traffic. As for Tor, someone said (I think it was in a DEFCON presentation) that it is designed to make Tor users look alike, not make Tor users look like non-Tor users. Tor offers anonymity, not privacy or confidentiality (and if the baseband traffic is unencrypted and/or unauthenticated, it's actually probably easier to track people who are using Tor, and mess with their traffic, due to the relatively small number of exit nodes).
– a CVn
Feb 27 at 21:22
"VPN traffic also has a pretty significant fingerprint," Plus, DNS requests are NOT encrypted by the VPN... that's how Big Tech works around not having access to cookies and such; they infer data about you from lookups.
– MGoBlue93
Feb 27 at 23:35
Regarding previous comments. Absolutely, VPN traffic has a distinctive fingerprint. It often uses distinctive TCP or UDP ports (VPN comes in a handful of varieties). Even when it uses a common port such as 443 it has distinctive characteristics. We know this because the great firewall of china is able to block and/or degrade SSL VPN traffic. I'd further suggest though that there are many common and legitimate uses of VPN so most network admins don't flag it for review. I would say Tor traffic is far less likely to fly under the radar.
– jorfus
Feb 28 at 18:25
I'm not sure if it matters enough, you should consider mentioning that an ISP could inspect your DNS traffic to 1.1.1.1 (or others) as well. It requires DPI on their end, but is feasible enough that they may decide to implement it. Also, if you are using a VPN, ideally your DNS will be routed through the tunnel as well, so the choice of which DNS provider you use matters less (in terms of ISP snooping at least).
– Vidia
2 days ago
@Vidia some DNS providers, such as 1.1.1.1 or 8.8.8.8 implement DNS-over-HTTPS. Your ISP may still know which websites you are visiting through other means (eg. TLS-SNI) but your DNS requests should be safe from eavesdroppers.
– Droplet
2 days ago
|
show 1 more comment
1
VPN traffic also has a pretty significant fingerprint, so if someone is logging DPI data they can just as easily look for signs of VPN traffic as for signs of Tor traffic. As for Tor, someone said (I think it was in a DEFCON presentation) that it is designed to make Tor users look alike, not make Tor users look like non-Tor users. Tor offers anonymity, not privacy or confidentiality (and if the baseband traffic is unencrypted and/or unauthenticated, it's actually probably easier to track people who are using Tor, and mess with their traffic, due to the relatively small number of exit nodes).
– a CVn
Feb 27 at 21:22
"VPN traffic also has a pretty significant fingerprint," Plus, DNS requests are NOT encrypted by the VPN... that's how Big Tech works around not having access to cookies and such; they infer data about you from lookups.
– MGoBlue93
Feb 27 at 23:35
Regarding previous comments. Absolutely, VPN traffic has a distinctive fingerprint. It often uses distinctive TCP or UDP ports (VPN comes in a handful of varieties). Even when it uses a common port such as 443 it has distinctive characteristics. We know this because the great firewall of china is able to block and/or degrade SSL VPN traffic. I'd further suggest though that there are many common and legitimate uses of VPN so most network admins don't flag it for review. I would say Tor traffic is far less likely to fly under the radar.
– jorfus
Feb 28 at 18:25
I'm not sure if it matters enough, you should consider mentioning that an ISP could inspect your DNS traffic to 1.1.1.1 (or others) as well. It requires DPI on their end, but is feasible enough that they may decide to implement it. Also, if you are using a VPN, ideally your DNS will be routed through the tunnel as well, so the choice of which DNS provider you use matters less (in terms of ISP snooping at least).
– Vidia
2 days ago
@Vidia some DNS providers, such as 1.1.1.1 or 8.8.8.8 implement DNS-over-HTTPS. Your ISP may still know which websites you are visiting through other means (eg. TLS-SNI) but your DNS requests should be safe from eavesdroppers.
– Droplet
2 days ago
1
1
VPN traffic also has a pretty significant fingerprint, so if someone is logging DPI data they can just as easily look for signs of VPN traffic as for signs of Tor traffic. As for Tor, someone said (I think it was in a DEFCON presentation) that it is designed to make Tor users look alike, not make Tor users look like non-Tor users. Tor offers anonymity, not privacy or confidentiality (and if the baseband traffic is unencrypted and/or unauthenticated, it's actually probably easier to track people who are using Tor, and mess with their traffic, due to the relatively small number of exit nodes).
– a CVn
Feb 27 at 21:22
VPN traffic also has a pretty significant fingerprint, so if someone is logging DPI data they can just as easily look for signs of VPN traffic as for signs of Tor traffic. As for Tor, someone said (I think it was in a DEFCON presentation) that it is designed to make Tor users look alike, not make Tor users look like non-Tor users. Tor offers anonymity, not privacy or confidentiality (and if the baseband traffic is unencrypted and/or unauthenticated, it's actually probably easier to track people who are using Tor, and mess with their traffic, due to the relatively small number of exit nodes).
– a CVn
Feb 27 at 21:22
"VPN traffic also has a pretty significant fingerprint," Plus, DNS requests are NOT encrypted by the VPN... that's how Big Tech works around not having access to cookies and such; they infer data about you from lookups.
– MGoBlue93
Feb 27 at 23:35
"VPN traffic also has a pretty significant fingerprint," Plus, DNS requests are NOT encrypted by the VPN... that's how Big Tech works around not having access to cookies and such; they infer data about you from lookups.
– MGoBlue93
Feb 27 at 23:35
Regarding previous comments. Absolutely, VPN traffic has a distinctive fingerprint. It often uses distinctive TCP or UDP ports (VPN comes in a handful of varieties). Even when it uses a common port such as 443 it has distinctive characteristics. We know this because the great firewall of china is able to block and/or degrade SSL VPN traffic. I'd further suggest though that there are many common and legitimate uses of VPN so most network admins don't flag it for review. I would say Tor traffic is far less likely to fly under the radar.
– jorfus
Feb 28 at 18:25
Regarding previous comments. Absolutely, VPN traffic has a distinctive fingerprint. It often uses distinctive TCP or UDP ports (VPN comes in a handful of varieties). Even when it uses a common port such as 443 it has distinctive characteristics. We know this because the great firewall of china is able to block and/or degrade SSL VPN traffic. I'd further suggest though that there are many common and legitimate uses of VPN so most network admins don't flag it for review. I would say Tor traffic is far less likely to fly under the radar.
– jorfus
Feb 28 at 18:25
I'm not sure if it matters enough, you should consider mentioning that an ISP could inspect your DNS traffic to 1.1.1.1 (or others) as well. It requires DPI on their end, but is feasible enough that they may decide to implement it. Also, if you are using a VPN, ideally your DNS will be routed through the tunnel as well, so the choice of which DNS provider you use matters less (in terms of ISP snooping at least).
– Vidia
2 days ago
I'm not sure if it matters enough, you should consider mentioning that an ISP could inspect your DNS traffic to 1.1.1.1 (or others) as well. It requires DPI on their end, but is feasible enough that they may decide to implement it. Also, if you are using a VPN, ideally your DNS will be routed through the tunnel as well, so the choice of which DNS provider you use matters less (in terms of ISP snooping at least).
– Vidia
2 days ago
@Vidia some DNS providers, such as 1.1.1.1 or 8.8.8.8 implement DNS-over-HTTPS. Your ISP may still know which websites you are visiting through other means (eg. TLS-SNI) but your DNS requests should be safe from eavesdroppers.
– Droplet
2 days ago
@Vidia some DNS providers, such as 1.1.1.1 or 8.8.8.8 implement DNS-over-HTTPS. Your ISP may still know which websites you are visiting through other means (eg. TLS-SNI) but your DNS requests should be safe from eavesdroppers.
– Droplet
2 days ago
|
show 1 more comment
Your parents will not normally have the authority to retrieve data from the ISP.
An ISP does not offer this type of information on request. You need some type of government warrant before they're released, and the process is non-trivial.
If you're worried about pr0n and simply silly stuff, then don't worry about it.
If you're Dread Pirate Roberts v2.0, and am asking on Stack Exchange for answers... this is a VERY ironic turn of events... since v1.0 was busted via Stack Exchange!
2
Thanks to the current FCC, ISPs are legally able to sell anyone's browser history--they just won't sell to commonfolk.
– Amalgovinus
yesterday
add a comment |
Your parents will not normally have the authority to retrieve data from the ISP.
An ISP does not offer this type of information on request. You need some type of government warrant before they're released, and the process is non-trivial.
If you're worried about pr0n and simply silly stuff, then don't worry about it.
If you're Dread Pirate Roberts v2.0, and am asking on Stack Exchange for answers... this is a VERY ironic turn of events... since v1.0 was busted via Stack Exchange!
2
Thanks to the current FCC, ISPs are legally able to sell anyone's browser history--they just won't sell to commonfolk.
– Amalgovinus
yesterday
add a comment |
Your parents will not normally have the authority to retrieve data from the ISP.
An ISP does not offer this type of information on request. You need some type of government warrant before they're released, and the process is non-trivial.
If you're worried about pr0n and simply silly stuff, then don't worry about it.
If you're Dread Pirate Roberts v2.0, and am asking on Stack Exchange for answers... this is a VERY ironic turn of events... since v1.0 was busted via Stack Exchange!
Your parents will not normally have the authority to retrieve data from the ISP.
An ISP does not offer this type of information on request. You need some type of government warrant before they're released, and the process is non-trivial.
If you're worried about pr0n and simply silly stuff, then don't worry about it.
If you're Dread Pirate Roberts v2.0, and am asking on Stack Exchange for answers... this is a VERY ironic turn of events... since v1.0 was busted via Stack Exchange!
answered 2 days ago
NelsonNelson
268210
268210
2
Thanks to the current FCC, ISPs are legally able to sell anyone's browser history--they just won't sell to commonfolk.
– Amalgovinus
yesterday
add a comment |
2
Thanks to the current FCC, ISPs are legally able to sell anyone's browser history--they just won't sell to commonfolk.
– Amalgovinus
yesterday
2
2
Thanks to the current FCC, ISPs are legally able to sell anyone's browser history--they just won't sell to commonfolk.
– Amalgovinus
yesterday
Thanks to the current FCC, ISPs are legally able to sell anyone's browser history--they just won't sell to commonfolk.
– Amalgovinus
yesterday
add a comment |
When you erase the router history, you are hiding which device connected to your router stablished the communication.
The ISP still knows and stores the traffic that outcomes from your router to internet.
To hide traffic to your parents, any secured VPN should be enough:
Your ISP will know your are connected to a VPN but not the real traffic. On the other hand, the VPN provider will know the traffic, but in most cases not the origin
So, your parents will need both pieces (ISP & VPN provider) to solve the puzzle. In this way, unless they are federal I think your privacy should be safe.
If you want to play next level, as suggested in previous answers use Tor.
New contributor
This answer is difficult to read and doesn't seem to provide any new / useful information.
– Qwertie
Feb 27 at 22:53
2
1. using TOR is not forensics-proof... I know you're using TOR by looking at logs and 2. TOR exposes the OP to a whole different level of abuse.
– MGoBlue93
Feb 27 at 23:45
@MGoBlue93 It's Tor, not TOR. And if you want to make it difficult to discover the use of Tor, you can use a bridge relay with pluggable transports. That obfuscates the protocol to prevent an ISP from realizing you are using Tor. It is especially useful if your ISP or government tries to censor the Tor network.
– forest
14 hours ago
add a comment |
When you erase the router history, you are hiding which device connected to your router stablished the communication.
The ISP still knows and stores the traffic that outcomes from your router to internet.
To hide traffic to your parents, any secured VPN should be enough:
Your ISP will know your are connected to a VPN but not the real traffic. On the other hand, the VPN provider will know the traffic, but in most cases not the origin
So, your parents will need both pieces (ISP & VPN provider) to solve the puzzle. In this way, unless they are federal I think your privacy should be safe.
If you want to play next level, as suggested in previous answers use Tor.
New contributor
This answer is difficult to read and doesn't seem to provide any new / useful information.
– Qwertie
Feb 27 at 22:53
2
1. using TOR is not forensics-proof... I know you're using TOR by looking at logs and 2. TOR exposes the OP to a whole different level of abuse.
– MGoBlue93
Feb 27 at 23:45
@MGoBlue93 It's Tor, not TOR. And if you want to make it difficult to discover the use of Tor, you can use a bridge relay with pluggable transports. That obfuscates the protocol to prevent an ISP from realizing you are using Tor. It is especially useful if your ISP or government tries to censor the Tor network.
– forest
14 hours ago
add a comment |
When you erase the router history, you are hiding which device connected to your router stablished the communication.
The ISP still knows and stores the traffic that outcomes from your router to internet.
To hide traffic to your parents, any secured VPN should be enough:
Your ISP will know your are connected to a VPN but not the real traffic. On the other hand, the VPN provider will know the traffic, but in most cases not the origin
So, your parents will need both pieces (ISP & VPN provider) to solve the puzzle. In this way, unless they are federal I think your privacy should be safe.
If you want to play next level, as suggested in previous answers use Tor.
New contributor
When you erase the router history, you are hiding which device connected to your router stablished the communication.
The ISP still knows and stores the traffic that outcomes from your router to internet.
To hide traffic to your parents, any secured VPN should be enough:
Your ISP will know your are connected to a VPN but not the real traffic. On the other hand, the VPN provider will know the traffic, but in most cases not the origin
So, your parents will need both pieces (ISP & VPN provider) to solve the puzzle. In this way, unless they are federal I think your privacy should be safe.
If you want to play next level, as suggested in previous answers use Tor.
New contributor
edited Feb 27 at 23:17
New contributor
answered Feb 27 at 22:44
DrJuzoDrJuzo
213
213
New contributor
New contributor
This answer is difficult to read and doesn't seem to provide any new / useful information.
– Qwertie
Feb 27 at 22:53
2
1. using TOR is not forensics-proof... I know you're using TOR by looking at logs and 2. TOR exposes the OP to a whole different level of abuse.
– MGoBlue93
Feb 27 at 23:45
@MGoBlue93 It's Tor, not TOR. And if you want to make it difficult to discover the use of Tor, you can use a bridge relay with pluggable transports. That obfuscates the protocol to prevent an ISP from realizing you are using Tor. It is especially useful if your ISP or government tries to censor the Tor network.
– forest
14 hours ago
add a comment |
This answer is difficult to read and doesn't seem to provide any new / useful information.
– Qwertie
Feb 27 at 22:53
2
1. using TOR is not forensics-proof... I know you're using TOR by looking at logs and 2. TOR exposes the OP to a whole different level of abuse.
– MGoBlue93
Feb 27 at 23:45
@MGoBlue93 It's Tor, not TOR. And if you want to make it difficult to discover the use of Tor, you can use a bridge relay with pluggable transports. That obfuscates the protocol to prevent an ISP from realizing you are using Tor. It is especially useful if your ISP or government tries to censor the Tor network.
– forest
14 hours ago
This answer is difficult to read and doesn't seem to provide any new / useful information.
– Qwertie
Feb 27 at 22:53
This answer is difficult to read and doesn't seem to provide any new / useful information.
– Qwertie
Feb 27 at 22:53
2
2
1. using TOR is not forensics-proof... I know you're using TOR by looking at logs and 2. TOR exposes the OP to a whole different level of abuse.
– MGoBlue93
Feb 27 at 23:45
1. using TOR is not forensics-proof... I know you're using TOR by looking at logs and 2. TOR exposes the OP to a whole different level of abuse.
– MGoBlue93
Feb 27 at 23:45
@MGoBlue93 It's Tor, not TOR. And if you want to make it difficult to discover the use of Tor, you can use a bridge relay with pluggable transports. That obfuscates the protocol to prevent an ISP from realizing you are using Tor. It is especially useful if your ISP or government tries to censor the Tor network.
– forest
14 hours ago
@MGoBlue93 It's Tor, not TOR. And if you want to make it difficult to discover the use of Tor, you can use a bridge relay with pluggable transports. That obfuscates the protocol to prevent an ISP from realizing you are using Tor. It is especially useful if your ISP or government tries to censor the Tor network.
– forest
14 hours ago
add a comment |
Any website you browsed will be saved in ISP software (ex: MikroTik) which shows IP address, time and browsed url. If you have multiple devices running on same internet connection, even then information is going to be saved in ISP logs.
Only way to hide websites you are using is by securing.
- VPN: When something is browsed using any browser, first it goes through your internet connection to website which you are looking for but using VPN, first it goes from your internet connection to VPN IP address, then the website you are browsing. At this time your ISP will not be able to log whatever you are browsing, neither google nor any search engine will be able to log your data as they see VPN's IP address than yours.
- Firefox Private Browsing or Chrome Incognito prevent history and browsing data from being saved on the computer you’re using, but if there is in fact a piece of network hardware monitoring connections, using these browser features will not help.
- Browsec: Its a plugin/extension in firefox & chrome which works as VPN. You can use this if you want only your browser data to be hidden or secured.
New contributor
add a comment |
Any website you browsed will be saved in ISP software (ex: MikroTik) which shows IP address, time and browsed url. If you have multiple devices running on same internet connection, even then information is going to be saved in ISP logs.
Only way to hide websites you are using is by securing.
- VPN: When something is browsed using any browser, first it goes through your internet connection to website which you are looking for but using VPN, first it goes from your internet connection to VPN IP address, then the website you are browsing. At this time your ISP will not be able to log whatever you are browsing, neither google nor any search engine will be able to log your data as they see VPN's IP address than yours.
- Firefox Private Browsing or Chrome Incognito prevent history and browsing data from being saved on the computer you’re using, but if there is in fact a piece of network hardware monitoring connections, using these browser features will not help.
- Browsec: Its a plugin/extension in firefox & chrome which works as VPN. You can use this if you want only your browser data to be hidden or secured.
New contributor
add a comment |
Any website you browsed will be saved in ISP software (ex: MikroTik) which shows IP address, time and browsed url. If you have multiple devices running on same internet connection, even then information is going to be saved in ISP logs.
Only way to hide websites you are using is by securing.
- VPN: When something is browsed using any browser, first it goes through your internet connection to website which you are looking for but using VPN, first it goes from your internet connection to VPN IP address, then the website you are browsing. At this time your ISP will not be able to log whatever you are browsing, neither google nor any search engine will be able to log your data as they see VPN's IP address than yours.
- Firefox Private Browsing or Chrome Incognito prevent history and browsing data from being saved on the computer you’re using, but if there is in fact a piece of network hardware monitoring connections, using these browser features will not help.
- Browsec: Its a plugin/extension in firefox & chrome which works as VPN. You can use this if you want only your browser data to be hidden or secured.
New contributor
Any website you browsed will be saved in ISP software (ex: MikroTik) which shows IP address, time and browsed url. If you have multiple devices running on same internet connection, even then information is going to be saved in ISP logs.
Only way to hide websites you are using is by securing.
- VPN: When something is browsed using any browser, first it goes through your internet connection to website which you are looking for but using VPN, first it goes from your internet connection to VPN IP address, then the website you are browsing. At this time your ISP will not be able to log whatever you are browsing, neither google nor any search engine will be able to log your data as they see VPN's IP address than yours.
- Firefox Private Browsing or Chrome Incognito prevent history and browsing data from being saved on the computer you’re using, but if there is in fact a piece of network hardware monitoring connections, using these browser features will not help.
- Browsec: Its a plugin/extension in firefox & chrome which works as VPN. You can use this if you want only your browser data to be hidden or secured.
New contributor
edited Feb 28 at 14:45
Robotic Extremeties
12315
12315
New contributor
answered Feb 28 at 11:17
AkramAkram
112
112
New contributor
New contributor
add a comment |
add a comment |
In answer to the OP's actual questions.
Yes, it is still visible and not deleted from existence.
So anything you have looked at will be available for your ISP to deliver to the account holder or law enforcement/government agencies etc.
Now if you want to stop the data being so easy to gather, (not impossible but shall we say financially restrictive) look at the other answers which show you some good ways of providing deniability, note I do not say you could hide you were up to something. If your parents say you've been using Tor or a VPN you can always say it was to look at TV shows that were restricted in your country rather then searching for well whatever triggered your original question.
Also don't use incognito mode it hides nothing from your ISP it only stops the local browser from storing your browser history.
add a comment |
In answer to the OP's actual questions.
Yes, it is still visible and not deleted from existence.
So anything you have looked at will be available for your ISP to deliver to the account holder or law enforcement/government agencies etc.
Now if you want to stop the data being so easy to gather, (not impossible but shall we say financially restrictive) look at the other answers which show you some good ways of providing deniability, note I do not say you could hide you were up to something. If your parents say you've been using Tor or a VPN you can always say it was to look at TV shows that were restricted in your country rather then searching for well whatever triggered your original question.
Also don't use incognito mode it hides nothing from your ISP it only stops the local browser from storing your browser history.
add a comment |
In answer to the OP's actual questions.
Yes, it is still visible and not deleted from existence.
So anything you have looked at will be available for your ISP to deliver to the account holder or law enforcement/government agencies etc.
Now if you want to stop the data being so easy to gather, (not impossible but shall we say financially restrictive) look at the other answers which show you some good ways of providing deniability, note I do not say you could hide you were up to something. If your parents say you've been using Tor or a VPN you can always say it was to look at TV shows that were restricted in your country rather then searching for well whatever triggered your original question.
Also don't use incognito mode it hides nothing from your ISP it only stops the local browser from storing your browser history.
In answer to the OP's actual questions.
Yes, it is still visible and not deleted from existence.
So anything you have looked at will be available for your ISP to deliver to the account holder or law enforcement/government agencies etc.
Now if you want to stop the data being so easy to gather, (not impossible but shall we say financially restrictive) look at the other answers which show you some good ways of providing deniability, note I do not say you could hide you were up to something. If your parents say you've been using Tor or a VPN you can always say it was to look at TV shows that were restricted in your country rather then searching for well whatever triggered your original question.
Also don't use incognito mode it hides nothing from your ISP it only stops the local browser from storing your browser history.
edited 14 hours ago
forest
37.1k17120132
37.1k17120132
answered Feb 28 at 10:23
GawainukGawainuk
29614
29614
add a comment |
add a comment |
Regular consumer routers save basic identifiers of devices that have been connected to it. Some routers, especially many of the newer ones, do allow basic logging of hostnames or sites visited based on DNS lookups, but usually not full URLs. Some can be configured to send periodic emails of the log. Depending on the router, it may be possible to unplug it to clear the log. If you know how big your router's log is, and you know that email is turned off, you could try to get rid of the old log data by visiting lots of random websites. ISPs generally do not keep logs, at least not logs that they share. Their main concern is with spam being generated from infected customer hosts within their network.
The NSA does log everything that they can, and this might be used against you in the future.
If you do know that logs were kept, then you better act fast and invite some friends over so that they can be blamed for the naughty sites, and set up a temporary Tor exit node or other public proxy on your computer so that you can blame it on that. This is only if the situation is serious.
add a comment |
Regular consumer routers save basic identifiers of devices that have been connected to it. Some routers, especially many of the newer ones, do allow basic logging of hostnames or sites visited based on DNS lookups, but usually not full URLs. Some can be configured to send periodic emails of the log. Depending on the router, it may be possible to unplug it to clear the log. If you know how big your router's log is, and you know that email is turned off, you could try to get rid of the old log data by visiting lots of random websites. ISPs generally do not keep logs, at least not logs that they share. Their main concern is with spam being generated from infected customer hosts within their network.
The NSA does log everything that they can, and this might be used against you in the future.
If you do know that logs were kept, then you better act fast and invite some friends over so that they can be blamed for the naughty sites, and set up a temporary Tor exit node or other public proxy on your computer so that you can blame it on that. This is only if the situation is serious.
add a comment |
Regular consumer routers save basic identifiers of devices that have been connected to it. Some routers, especially many of the newer ones, do allow basic logging of hostnames or sites visited based on DNS lookups, but usually not full URLs. Some can be configured to send periodic emails of the log. Depending on the router, it may be possible to unplug it to clear the log. If you know how big your router's log is, and you know that email is turned off, you could try to get rid of the old log data by visiting lots of random websites. ISPs generally do not keep logs, at least not logs that they share. Their main concern is with spam being generated from infected customer hosts within their network.
The NSA does log everything that they can, and this might be used against you in the future.
If you do know that logs were kept, then you better act fast and invite some friends over so that they can be blamed for the naughty sites, and set up a temporary Tor exit node or other public proxy on your computer so that you can blame it on that. This is only if the situation is serious.
Regular consumer routers save basic identifiers of devices that have been connected to it. Some routers, especially many of the newer ones, do allow basic logging of hostnames or sites visited based on DNS lookups, but usually not full URLs. Some can be configured to send periodic emails of the log. Depending on the router, it may be possible to unplug it to clear the log. If you know how big your router's log is, and you know that email is turned off, you could try to get rid of the old log data by visiting lots of random websites. ISPs generally do not keep logs, at least not logs that they share. Their main concern is with spam being generated from infected customer hosts within their network.
The NSA does log everything that they can, and this might be used against you in the future.
If you do know that logs were kept, then you better act fast and invite some friends over so that they can be blamed for the naughty sites, and set up a temporary Tor exit node or other public proxy on your computer so that you can blame it on that. This is only if the situation is serious.
edited 14 hours ago
forest
37.1k17120132
37.1k17120132
answered 2 days ago
Alex CannonAlex Cannon
31316
31316
add a comment |
add a comment |
protected by Community♦ yesterday
Thank you for your interest in this question.
Because it has attracted low-quality or spam answers that had to be removed, posting an answer now requires 10 reputation on this site (the association bonus does not count).
Would you like to answer one of these unanswered questions instead?
12
If you're that worried, employ incognito mode, only use DuckDuckGo (or similar) as your search engine and always browse using a VPN.
– NeepNeepNeep
Feb 27 at 15:09
79
Are there consumer-grade routers that store any history by default?
– JPhi1618
Feb 27 at 18:11
17
@NeepNeepNeep "If you're that worried, employ incognito mode, only use DuckDuckGo (or similar) as your search engine and always browse using a VPN"... none of which helps him out. The OP asked at the ISP. The ISP would still have that info... and even the VPN only helps to a point -- because DNS requests are still exposed.
– MGoBlue93
Feb 27 at 23:31
59
@MGoBlue93 That is incorrect. A properly configured VPN for privacy from your ISP will not expose DNS requests. Everything, including DNS, goes through the VPN.
– forest
Feb 28 at 2:12
22
@MGoBlue93 "A or not A" are two binary choices. Forest specified a properly configured VPN for their answer, your comment says a VPN can only help to a point. Sure, there are infinite ways to not properly configure a VPN and thousands of VPNs that don't provide automatic proper configurations, but if the VPN is properly configured, then DNS requests are not exposed. Also, Forest did not attack you, they pointed out an error. Attacking is what you are doing by directing an insult at Forest (calling that person uneducated), and claiming they are attacking you.
– Davy M
Feb 28 at 18:18