[luv-talk] Pre-emptive masking of browser history at ISP

Russell Coker russell at coker.com.au
Thu Dec 8 14:14:45 AEDT 2016

On Thursday, 8 December 2016 10:51:17 AM AEDT Rohan McLeod via luv-talk wrote:
> just wonder what  is the established wisdom regarding:
> "Pre-emptive masking of browser history at ISP"

Since Snowden blew the whistle on illegal spying the use of HTTPS has greatly 
increased.  Your search history at Google isn't available to your local 
government unless Google cooperates with them.  If a Google search redirects 
you to a major news site like the New York Times it wouldn't reveal much if 
they used HTTPS, but they however choose not to do that and additionally have 
77 cookies from different advertising sites, Facebook, Google, and others when 
you view one of their pages.


If you view web sites with Tor then their ability to track you is greatly 
reduced.  Tor with your regular browser can still be identified, visit the 
above site to discover how easily it can be done.  Tor with torbrowser 
(package torbrowser-launcher in Debian, it works in Jessie but is broken in 
Unstable) is very hard to track.

Tor with your regular browser is adequate to stop the basic snooping as 
described in the article you cited.


If you want to protect against very basic snooping while still getting good 
transfer speeds (Tor slows throughput and increases latency) then a VPN such 
as the above is a good option.  They block SMTP (for obvious reasons) and 
would not be suitable for serious crimes such as wholesale drug dealing.  But 
for using Bittorrent to download movies and to escape casual surveillance by 
your own government they are good.

My Main Blog         http://etbe.coker.com.au/
My Documents Blog    http://doc.coker.com.au/

More information about the luv-main mailing list