Global Privacy Control vs ISPs

  • Be sure to checkout “Tips & Tricks”
    Dear Guest Visitor → Once you register and log-in please checkout the “Tips & Tricks” page for some very handy tips!

    /Steve.
  • BootAble – FreeDOS boot testing freeware

    To obtain direct, low-level access to a system's mass storage drives, SpinRite runs under a GRC-customized version of FreeDOS which has been modified to add compatibility with all file systems. In order to run SpinRite it must first be possible to boot FreeDOS.

    GRC's “BootAble” freeware allows anyone to easily create BIOS-bootable media in order to workout and confirm the details of getting a machine to boot FreeDOS through a BIOS. Once the means of doing that has been determined, the media created by SpinRite can be booted and run in the same way.

    The participants here, who have taken the time to share their knowledge and experience, their successes and some frustrations with booting their computers into FreeDOS, have created a valuable knowledgebase which will benefit everyone who follows.

    You may click on the image to the right to obtain your own copy of BootAble. Then use the knowledge and experience documented here to boot your computer(s) into FreeDOS. And please do not hesitate to ask questions – nowhere else can better answers be found.

    (You may permanently close this reminder with the 'X' in the upper right.)

mjp66

Member
Oct 4, 2020
6
5
@Steve

1. In Security Now #869, you talked about Global Privacy Control. Do ISP's need to (also) abide by an enabled GPC flag and not snoop / re-sell your data, as that data transitions through them?

2. I wrote "Ubiquiti Home Network" document, You mentioned it in SN#641 and SN#649. See own link farm. Probably time for another SN mention, given current state of IOT devices and need for their isolation. Document has about doubled in size since then.

Thanks,
-Mike Potts
 
as that data transitions through them?
It would be a very poor web site that doesn't use SSL in this day in age. In the case of SSL all the ISP could "see" is IP addresses, and while that tells them something (meta data about WHO you are interacting with) it gives them no clue about the content. There are also DNS lookups, which would default to your IPS's DNS, but you can easily change that with DNS over HTTPS other enhancements.
 
first handshake
The first handshake is merely a negotiation of capabilities. None of the site's content would make an appearance. There would be no more information gained than knowing the site you were going to, and possibly the quality of their encryption, and that would already be known if your communications were being monitored.

Here's a colloquial description of the handshake. https://d1smxttentwwqu.cloudfront.net/wp-content/uploads/2015/07/SSLTLS_handshake.png
 
Last edited: