• 3 Posts
  • 1.44K Comments
Joined 2 years ago
cake
Cake day: July 11th, 2023

help-circle














  • Forgive me for not covering 100% of this advanced topic in my 3 paragraphs on Lemmy…

    Quite obviously the problem is not that you did not write an 560 page essay, but that you were misleading by basically saying “nah, it’s fine, nothing could leak, everything is ultra secure nowadays”.

    If you purposefully steer your car off the road… of course you’re going to crash. If you’re going to expose non-encrypted things onto the internet…

    did you just ignore a whole lot of points here? DNS, SNI? smb clients? whatever else? its not like I’m using HTTP. things are largely encrypted, the rest is out of reach!

    Encrypted SNI (ESNI) / Encrypted Client Hello (ECH) exists… Cloudflare for example supports ECH, and they transit a LOT of data.

    how many sites exactly support that configuration? do you need additional configuration for that in e.g. nginx? if so, most selfhosters probably don’t have it, because it’s talked about almost nowhere.

    and is it finally enabled by default in firefox? will firefox just retry without encryption when the connection fails?

    But once again… would be outside of the scope of discussion here. Yes… an ISP can make an educated guess of where you’re likely to be going… and maybe even make a reasonable guess of what you could doing… But certainly not the details of it.

    it is certainly in scope. the discussion is not about security and your accounts getting hacked by evil EU, but privacy and data mining, for which all of these is a treasure trove.

    And this all ignores the fact that a random coffee shop isn’t going to do full packet inspection to get this data to begin with. It’s not worth it for them.

    probably not the coffee shop but the networking equipment, where even cheaper models include some form of “smart cloud security”


  • this is such an oversimplification. maybe it’s hard to distinguish between google services, but if you play some online game, chat over whatsapp or signal, or have a voip call, that’s an entirely different story. these can probably be told apart by DNS requests or active connections, and in the case of communications, messaging and voice calling is obvious to tell apart because of the difference in the volume of data. when having a voip call, through a service that supports peer to peer calls (most do, and it’s default on), an observer may even be able to deduct something about who you are speaking with, like what general area they live at.

    then what if you have apps that try to establish connections to services at home. like smb or nfs, https services. your smb/nfs client may leak your credentials, I think even linux does not encrypt smb communication unless you request it in a mount option, and with HTTPS you leak your internal domain names because of TLS SNI.