Posted on 02/05/2010 1:38:42 PM PST by Free ThinkerNY
They can monitor visits to THIS site, and gun sites too.
I thought this issue was pretty much paid to rest with library books. I remember hearing a while back the Feds wanted to be able to track BOOKS people took from the library “just in case” like this and they were told to go fish. No crime no right to check.
Phone calls are already there, I guess piling on MORE Government regulations is in style now.
Hurry, Hurry, HURRIE, GET your Government Regulations HERE while Obama is HOT......Hurrry, Hurrry.......
IXquick is completely SSL, including it’s free proxy service. Your ISP knows you went to IXquick, but doesn’t know anything else until you click on some link, not using the proxy. Until then, the stuff you see is secure.
Scroogle.org allows your ISP to see what you do UNLESS you use its special SSL mode “https://ssl.scroogle.org" Unfortunately, the default for everyone is the insecure version that screws you over with your ISP. But even if you click through on a Scroogle.org with your SSL mode, you leave SSL when you click on a link.
It is possible that the DNS lookup is what some ISPs will be recording. Using a different service will leave your ISP only knowing the final IP address at a point in time, which might be different for sites (especially for end-users) after a period of time, making just collecting IP address a little less useful.
There are paid proxy services that would take care of everything, but you are looking at probably $20+ dollars a month and slower web access for everything. More information here:
By the way, access Scroogle.org in that post assuring your browser isn’t pulling in a quote. The link works without the quote.
bump to track this thread. ;^)
Have you no shame, sir?
Don’t sweat it. You’re wasting your time.
The boys at Ft. Meade are years ahead of all of these “fixes”.
Ask the Imperial Japanese fleet.
(Hint: You’ll need a submarine.)
Really? Is it going to cut down on illegal immigration if we do so?
TOR does actually encrypt the internet traffic that is routed though it. The most that your ISP would know is that you routed traffic to another TOR relay.
Why does the Library (or bookstore) need to even keep a track history of your dealings once the transaction has completed (book has been returned to library or payment has cleared at a bookstore)?
Yet we read miranda rights to international terrorists who attempt to kill hundreds of Americans.
Well, if you are an exit point, every website other people accessed through your connection would be known. Did they go to a child porn site? If so, your exit node told your ISP it was you who went there.
You could choose to not be an exit point, but you are one of the pile-on people who load TOR down.
Finally, did you know that all of the traffic that exits TOR at one of those endpoints is viewable by the person with the endpoint? Free Republic does not encrypt our logins or anything, meaning your name and password go through in plaintext for them to play with.
Enjoy.
More seriously, can we start asking whether or not the types of things the government needs to investigate is worth surrendering even more of our privacy?
Could you please explain a little more about how Open DNS works after you install it? Does it do what it does automatically or do you have to activate it every time you go online? I already use Ixquick and Firefox’s Ghostery, so I’m good in that aspect in regards to your recommendations.
Or you could be a non-exit relay. There's no real shame in not wanting to be an exit relay given the kinds of risk and server load.
Finally, did you know that all of the traffic that exits TOR at one of those endpoints is viewable by the person with the endpoint?
Yes, the TOR docs are quite specific on this - that it only encrypts the relay-to-relay traffic, not end-to-end traffic. But that's usually enough to protect you from an ISP snooping (again unless you're an exit relay). But this isn't much different from the regular internet. FR hasn't felt it necessary to implement SSL logins so anyone sufficiently interested could steal your FR login info already.
Exactly. Everything is logged. In some cases, every keystroke is logged. They can sit around for months or years before being cleared.
To really use OpenDNS best, you need to go into your router and change your DNS numbers to the two OpenDNS gives. When you do that, any computer using dynamic IP through your router will also use OpenDNS. You could just put it in your network settings on your home computer, though. Make sure no other fallback exists, and if you are on Comcast, you also need to go into your online account settings to turn off their default behavior of resolving your missed addresses.
http://arstechnica.com/tech-policy/news/2009/08/comcasts-dns-redirect-service-goes-nationwide.ars
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.