Discussion Forums > Technology
Can ISPs see the full adress you put into the adress bar?
kitamesume:
with encryptions having a standard table all it would take is time imho =P
Pentium100:
--- Quote from: kitamesume on August 23, 2012, 07:26:17 PM ---with encryptions having a standard table all it would take is time imho =P
--- End quote ---
What standard table? You mean rainbow tables? Those are for hashes (which are different than encryption) and can be easily defeated (by using salt).
And yes, any encryption can be decrypted, given enough time. Though for the better algorithms, the time approaches (and exceeds) the current age of the universe.
Pagonis:
--- Quote from: Pentium100 on August 18, 2012, 01:42:26 AM ---Yes, the ISP can capture packets and see the request you make to an unsecure (http) server and see the returned page.
(click to show/hide)GET /167185-akb0048-720p-10-bit-evetaku.html HTTP/1.1
User-Agent: Opera/9.80 (Windows NT 5.1; U; en) Presto/2.6.30 Version/10.63
Host: bakabt.me
Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
Accept-Language: en,lt-LT;q=0.9,lt;q=0.8
Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
Referer: http://bakabt.me/browse.php?limit=15&page=1
Cookie: last_torrents=a%3A0%3A%7B%7D; last_visit=a%3A3%3A%7Bi%3A0%3Bi%3A1345257332%3Bi%3A1%3Bi%3A1345257368%3Bi%3A2%3Bi%3A1345257362%3B%7D; __utma=258658201.103968967.1345257098.1345257098.1345257098.1; __utmb=258658201.5.10.1345257098; __utmc=258658201; __utmz=258658201.1345257098.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none)
Cookie2: $Version=1
Connection: Keep-Alive, TE
TE: deflate, gzip, chunked, identity, trailers
If you do not want your ISP to know what you are sending, you ave to use secure (https) severs. Then the data is encrypted so the ISP (or anyone else on the wire) cannot decrypt it. If you want to make sure that your ISP does not know what server you are sending the data to, you have to use anonymizing networks, like TOR.
--- End quote ---
Packets? Why so complicated? A lot of ISPs are running Squid or similar software, so checking logs is simpler. Also, https won't help at all, seriously... Use VPN.
Pentium100:
--- Quote from: Pagonis on August 23, 2012, 09:09:51 PM ---Packets? Why so complicated? A lot of ISPs are running Squid or similar software, so checking logs is simpler. Also, https won't help at all, seriously... Use VPN.
--- End quote ---
Transparent proxies can be detected by the end user, also, running a transparent proxy requires more resources than just capturing packets.
By the way, HTTPS helps against transparent proxies - if you try to go to a https site and instead run into a transparent proxy, the browser will throw an error message saying that the certificate does not match (or was not issued by a trusted party). The connection will just not work (or you will have to manually allow the invalid certificate but then you do so knowingly).
Freedom Kira:
--- Quote from: kitamesume on August 23, 2012, 03:11:16 PM ---ISPs can see whatever they want even with all those protection layers, i mean all they'd do is mirror the datas flowing and decrypt them without interfering with the lines. the part with the decrypting though would be what they'd have the most trouble with.
--- End quote ---
--- Quote from: kitamesume on August 23, 2012, 07:26:17 PM ---with encryptions having a standard table all it would take is time imho =P
--- End quote ---
It's reeeaalllllyyyy obvious that you don't know what you're talking about.
Navigation
[0] Message Index
[#] Next page
[*] Previous page
Go to full version