this post was submitted on 13 Mar 2026
57 points (98.3% liked)

Privacy

47127 readers
1364 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

much thanks to @gary_host_laptop for the logo design :)

founded 6 years ago
MODERATORS
 

Noob here. This is probably the most repeated question, but I don't know the technical terms to make the appropiate digging online, and thought of asking humans before slopping my way around.

I don't trust my ISP or the government above it.

The ISP remotely manages the local network! So I installed a router of my own and my devices only to that one.

I would like to encrypt (?) anything that goes out of my own router, so my ISP doesn't evesdrop what I'm doing even if they want to (I know I know... if they really wanted, they could just send friends to my house).

Using Linux, Android GOS, and Pihole. They live under a "picked-up-from-a-shelf" router; and that router under theirs.

(I cannot get a different ISP)

Thanks

all 37 comments
sorted by: hot top controversial new old
[–] Auli@lemmy.ca 3 points 19 hours ago (2 children)

I mean all they can really see nowadays is the sni. Only thing isnt encrypted anymore. And yes their is encrypted hello bit nobody seems to be using it.

Sites are https so that is all encrypted set up DOH or DOT and your DNS is encrypted.

[–] entropiclyclaude@lemmy.wtf 3 points 16 hours ago (1 children)

DoH is not as private as you think, that’s just how big tech positioned it.

DoH encrypts DNS queries between your browser and the DNS resolver, it does not hide your browsing activity from the DoH provider itself.

Google, cloudflare or any other 3rd party orgs still see your data.

I have an open source firewall on gitlab if you wanna take a look. Blocks some IPs - I know it’s not much but fuck Palantir - I made it so their site won’t load.

Blocks 50+ stalkerware apps as well as data broker trackers.

I want to go back to it so you can wire in through my VPS and build it as a mobile app to block Gemini and Apple Intelligence from scraping your photos and texts and everything to train their models.

[–] Ascendor@discuss.tchncs.de 2 points 15 hours ago* (last edited 15 hours ago)

Well how could it? Of course the DNS provider needs to know the domain you want to look up - otherwise how would they be able to look it up?

Still it would fulfill the OP's wish: He wants to hide traffic from his ISP, so if he chooses a DNS resolver other than his ISP, and encrypt transmission, goal is achieved.

[–] umbrella@lemmy.ml 2 points 19 hours ago

sni may be enough depending on what a given oppressive isp/government wants to do.

[–] eleitl@lemmy.zip 5 points 23 hours ago

I also don't trust my ISP nor my national government, which is the bulk of my private Internet use goes over a fail-close VPN.

[–] x@niwego.com 46 points 1 day ago (1 children)

@certified_expert

I don't trust my ISP or the government above it.

I think everyone here today doesn't trust their ISP and government.

Use a #VPN or #TOR,Your ISP will only know the destination point, all traffic will be encrypted through a #tunnel

You said you installed a router. How did you configure the modem? In Full Bridge?

Also start changing your #DNS, don't use your ISP's default ones

[–] certified_expert@lemmy.world 6 points 1 day ago (1 children)

My pihole serves dns. If not found, it goes directly to root tables (I forgot how they are called).

The router, I just connected its WAN port to the ISP's switch/router/AP. Within the LAN under my router I have DHCP sending everybody to do lookups to the pihole. I don't know what full bridge is.

The ISP's modem/router/switch/AP, I cannot configure. It is a fucking "smart" brick remotely controlled.

[–] x@niwego.com 3 points 1 day ago* (last edited 11 hours ago) (1 children)

@certified_expert
so the modem that you have from your ISP it is not possible to configure it as, ONT,Bridge or Full Bridge . 🤔

Since you are just starting out, I recommend you start by subscribing to a VPN, (don't use the free ones)avoid tor for now, I use Mullvad which only allows 5 devices at the same time, but there are others, choose those that don't keep logs.

[–] TiredTiger@lemmy.ml 1 points 20 hours ago (1 children)

If you are able to set up OpenWRT on your router and run Mullvad through that, you can cover your whole network as one "device."

I recommend everyone get their own modem/router if they are able to. ISP's don't provide them for free and you have no idea what monitoring they do with their hardware.

[–] Auli@lemmy.ca 1 points 19 hours ago

They literally to vide them for free. And why so people use their service. Do you know how many people just use their modem and they up sell people WiFi repeaters and the like. The hardware is a fold mine for ISPs.

[–] unknowablenight@piefed.social 26 points 1 day ago (1 children)

A VPN? That routes the traffic to the other server, so the ISP can only see you're connecting to a VPN. Most people recommend Mullvad, I personally use Proton and Windscribe, both free, open source, and trusted.

[–] certified_expert@lemmy.world 8 points 1 day ago (4 children)

Can it be installed at a network level, rather than at a device level (like pihole)?

[–] eleitl@lemmy.zip 2 points 23 hours ago

You can run your VPN on your firewall (mine is opnsense, behind a cable modem in bridge mode). E.g. wireguard with Mullvad is a good option. Or you can set up a VPN client on your end devices -- Mullvad gives you 5 endpoints for one account.

[–] floquant@lemmy.dbzer0.com 8 points 1 day ago* (last edited 1 day ago) (1 children)

Yes, but support changes depending on your router. Not many in the consumer market support it, but you can run OpenWRT on either a supported router or a Linux box with at least two interfaces - a usb adapter works if you're on a budget, and ethernet+WiFi also counts. I would suggest looking into VPN providers that support Wireguard, as that's in my experience both faster and more reliable than OpenVPN.

For commercial alternatives you can just buy and import a wireguard conf file into, I know MikroTik routers support it and I believe GL.iNet does too. I'm pretty sure there are more, hopefully people can contribute their experiences.

I wouldn't recommend TOR for this usecase btw, you'd be adding a lot of latency when you don't need the additional anonymity layer.

[–] deadDuck@lemmy.ca 3 points 22 hours ago

Yes, GL.iNet routers have a VPN pane where you can simply enter the details of a WireGuard or OpenVPN server. I signed up for a free account at Proton, downloaded the configuration for a free WireGuard server, and installed it on the GL.iNet box. When I switch on the VPN in the router interface, all traffic flows through the VPN. I use it while travelling with my family. I can connect the travel router to the hotel or AirBnB wifi, then turn on the VPN (or not), then connect all the family devices to the travel router.

OP could do the same thing, assuming their router supports it, and set up a WireGuard VPN (much faster than OpenVPN) connection on the router and route all network traffic through it. A free VPN will always be slow and congested. A paid one is likely worthwhile in this case, especially if OP streams media.

[–] Gulliver@lemmy.zip 1 points 1 day ago

yes it can technically, but I've more heard about tor box than vpn box, a pi or whatever should work for both ! But only if you can install a client for your vpn, because if you don't have one I believe you have to download a .conf file for each IP of each server you want for your vpn but they change all the time.

[–] ki9@lemmy.gf4.pw 13 points 1 day ago* (last edited 1 day ago) (1 children)

VPN is the answer but keep in mind that you're just moving the trust to the VPN (they can see your traffic).

The web uses a request/response architecture. Your computer requests a cat pic from the server and the server sends a cat pic back. Your real IP address must be in the request... otherwise the response cannot be routed back to you. VPNs act like couriers making requests and receiving responses on your behalf. So:

  • The cat pic server sees traffic coming from the VPN provider and doesnt know who you are.
  • The ISP sees encrypted traffic to the VPN but doesn't know what it is.
  • The VPN sees everything.

Most web traffic is already encrypted with TLS but not the domain names and IPs (needed for routing).

If you really want to be anonymous on the web, use tor, but it's slow and many websites block tor exit nodes so you will have a degraded experience.

[–] certified_expert@lemmy.world 3 points 1 day ago (2 children)

If I use VPN, my isp will see that I send and receive gibblish to and from a single address (the vpn server), all over port 443, right?

If I use TOR, what does my ISP see?

[–] ki9@lemmy.gf4.pw 2 points 13 hours ago

Itll go over a different port depending on the vpn protocol (i recommend wireguard). So the isp will know it's vpn gibberish, but there are ways to tunnel the ciphertext through https again (like wstunnel). A bit overkill for your setup but comes in handy if you need to break through firewalls (if you are in china and wireguard ports are blocked but 443 is allowed)

If you use tor, your isp sees tor traffic (gibberish) but tor also supports obfuscation to make it look like http. All you need to use tor is tor browser (mobile apps exist too) so try it out... It's free but you will see the limitations I mentioned.

[–] SitD@lemy.lol 4 points 1 day ago* (last edited 1 day ago)
  1. yes
  2. the same, but probably to an even more unknown IP that is also changing frequently. the content itself should look equally random
[–] frightful_hobgoblin@lemmy.ml 9 points 1 day ago* (last edited 1 day ago)

This is what a VPN is for.

VPN is the answer to your question.

[–] voxel@feddit.uk 5 points 1 day ago (1 children)

A trustworthy VPN provider is your best solution here. Mullvad, IVPN, and ProtonVPN are common recommendations in the community. I would personally recommend against Windscribe; it is privacy-friendly but has had major bugs repeatedly in the past. If you want to go experimental, check out NymVPN and Obscura (Apple platforms only).

[–] osanna@lemmy.vg 2 points 1 day ago

While we’re recommending/not recommending vpns, don’t use PIA. they WERE the go to. But they’re owned by an American company now and based there.

[–] a4ng3l@lemmy.world 6 points 1 day ago (1 children)

On top of client VPNs you might consider the possible other freebies from yr ISP such as router, WiFi access points and other network elements they provide you with. Set-op-boxes as well. All those equipments are absolutely ratting you as much as possible. Also any software including mobile apps they provide for support / billing / whatever.

[–] certified_expert@lemmy.world 1 points 1 day ago (1 children)

I think I am not understanding this comment. I'm saying I don't trust the ISP. Why would I invade my house and phone with more of their gadgets?

[–] a4ng3l@lemmy.world 2 points 1 day ago

They don’t provide you any equipment ? Then good. It’s very typical for them to do so.

[–] hansolo@lemmy.today 5 points 1 day ago (1 children)

Get a VPN. This is 50% of what they're for.

[–] certified_expert@lemmy.world 1 points 1 day ago (1 children)

What is the other 50%? How is a VPN trustworthy?

[–] osanna@lemmy.vg 2 points 1 day ago (1 children)

You’re asking the right questions.

VPNs aren’t much safer. You’re putting your trust in a vpn company instead of an isp. If the vpn company is compromised (such as with Pia) then you’re no better off than if you’d not used the vpn. Tor isn’t that much safer these days since the nsa runs Tor exit nodes. Best bet is a no logging vpn. Though you’re again putting your trust in them that they actually don’t log. Whether or not they do is only known to them.

[–] SitD@lemy.lol 2 points 1 day ago

I think the nsa is not going to cast doubts over tor by leaking information from normal people or small fry criminals like pirates. and if you're a dissident from a different country than usa, it's probably also fine. I'm a lot more worried about the vpns that pay or own vpn review sites or have ties to surveillance companies

[–] scytale@piefed.zip 4 points 1 day ago* (last edited 1 day ago) (1 children)

Other than a VPN, use a privacy respecting DoH provider on your router so all your devices use that instead of your ISP for DNS.

[–] certified_expert@lemmy.world 1 points 1 day ago (1 children)

My router's DHCP service is pointing clients to the pihole for DNS. Should I run that on HTTPS too? Can the pi do that?

[–] deadDuck@lemmy.ca 2 points 22 hours ago

It's not necessary for the pihole to run over HTTPS, because that would only encrypt traffic between the pi and your device within your own network. When the pi doesn't have the DNS that your device requests, it looks it up from the internet. You've probably set the DNS lookup servers in pihole. That's a good start to avoid your ISP. The servers you choose may support DoH, and. you should use ones that do. That way, when the pi sends a DNS lookup to the internet, via your ISP, it's encrypted by HTTPS so your ISP can't inspect it.

[–] sic_semper_tyrannis@lemmy.today 2 points 1 day ago (1 children)

Once you put a VPN on your router, be sure to have a few servers setup so if one isn't behaving right you can log into your router and quickly switch servers.

[–] certified_expert@lemmy.world 1 points 1 day ago (1 children)

How can I install a VPN client in a router? A simple soho device, like those tplink, dlink, asus... It doesn't support openwrt.

[–] sic_semper_tyrannis@lemmy.today 2 points 23 hours ago

The software must support it. If OpenWRT isn't an option then maybe another software is such as DD-WRT or FreshTomato or sometimes the OEM software does too. You could also put a dedicated firewall device before your router with OPNsense and put a VPN on that