How Governments Watch the Web - Why Absolutely Privacy Online Doesn't Exist
ฝัง
- เผยแพร่เมื่อ 7 ก.พ. 2025
- In this second instalment of my privacy series, I cover how governments and big tech aggregate data to effectively monitor all users on the internet. We cover how data is captured using network taps, how popular websites provide data feeds, and the tools used to analyze it all.
Projects:
Netstats: netstats.app
Netprobe Lite: github.com/pla...
Support the channel:
buymeacoffee.c...
Discord:
/ discord
Another Excellent Video, I remember attending a Blackberry Conference in 2015 and the words on good deal of the slides were "Remember that every contact has a trace" that phrase has stuck with me ever since as it was true then and is today.
Still very true
I use Quad 9 for DNS which is known for exceptional privacy set on my router. My external firewall has an unbound feature with the option to set that to encryption over a 3rd party vpn. From what i understand Quad 9 is not based out of a country subject to the 14 Eyes Alliance and the 3rd party vpn i use also is not based in a country subject to those laws as well. It may not be a full proof setup but i try to make it as hard as possible for any 3rd parties to monitor my traffic. Great video!
Yeah that’s the best you can do. I cover this in a video that’s coming out in a few weeks but basically get a good DNS, get some form of ad tracking for your network and potentially use secure DNS as well if your VPN doesn’t tunnel it
@@plaintextpackets I need to check out that video. There was another one i saw that said be careful of using a vpn on all devices in a network because that can raise suspicion. With my external firewall i can pick out particular packets to send over a vpn without even putting the entire device on the vpn. I never was really into networking until a few years ago before I started learning what data entities can see ISPs, governments, etc.). Not to mention using public wifi which basically screams “look at me!”. 😅
Ed Snowden said the meta-data is enough to figure out what you're up to. They don't need to your actual data, just who you are connecting to , for how long, and how often.
This
This was really fascinating and well presented. Thanks!
Thank you!
If you have a court order, you don't bother with a tap, you just make them port mirror the uplink to your own server.
They don’t even need the order
In the 90’s I worked for a defense contractor that was building a telephone and internet recorder to be installed at phone companies, so yeah they are spying, I mean duh.
The scale is different. So before they could listen into a conversation. Now the tools can listen into all conversations and aggregate
Thankyou for your time and effort with these videos
My pleasure!
One also theoretically problematic technology, is the prevelance of reverse proxy services/CDNs like CloudFlare or AWS CloudFront, which commonly cause a gap in TLS encryption, between your client and even smaller websites, that wouldn't be cooperating with intelegence.
First of all, thank you for giving us valuable information. I am a student and as I get information on such subjects, I am really happy as I learn. I would have a question for you about another subject. For example, when we talk about a topic related to my family, I immediately see advertisements on the phone, tablet, or computer related to the content we are talking about. How does this happen? Even if technology companies are listening to us, how does this immediately appear as an advertisement? Thanks in advance I am waiting for the continuation of the videos.
I’m making a video on this :-)
@@plaintextpackets Thankyou So Much
Great video!
Thanks!
i just want to understand the implications of using a VPN + DNS OVER HTTPS
VPN encrypts your traffic across the internet, while DNS over HTTPS encrypts your requests to the DNS server you have set (most likely your ISP)
I’ll do a vid on various protection methods like dns sec, vpns, tor, etc
Government may not see direct traffic, but they force vpn providers to keep logs, so whey they "need", they'd just ask them. So the only way to actually be private is via tor or i2p, vpns are never meant to be private
@@anthonyb5174 vpn encryption isnt needed when https exists
Just awesome!!!
Thanks!
Have you ever thought of reading for Libra Vox?
I haven't, don't have any books to publish :)
@@plaintextpackets I'd listen to your audiobook for sure.
Does a VPN offer any authentic type of protection from this ?
Or are VPN providers simply honeypots ?
I don’t think they are all feeding their logs to authorities all the time, no. But I do believe any company can be compelled secretly to provide those logsZ
@@plaintextpackets Thanks ... I always thought about these well known VPN companies as a three letters organizations funded private companies that would "facilitate" information when needed. It is a centralized and easier way for them to get your data, rather than going to ISPs directly which would involve a bit more bureocracy and/or paperwork... but I may be wrong
Good point. I'm doing a video on how VPNs work and I explain that you're basically shifting the trust domain to a different actor.
Google: "machine, learn this" ✌🏽
You can actually be anonymous but it is not a walk in the park. Lots of remote proxies ... TOR proxies have end points but they're varied although they can and many times are monitored hence why setting up a network of remote physical proxies internationally is the way to go... But again its not a simple task and a lot of trust goes into those in your isolated anonymous network. Proxy chains work... Nuff said....
Exactly. The average user can never really be expected to implement everything needed to be totally private
The U.S. Military Created the Internet. That should tell you a lot
How international criminal organizations are able to log into your Instagram/Facebook/etc. accounts even if you never click on their links?!?
Weak password
so basically the government could find out about anything?
Yup
@@plaintextpackets hey bro would it be possible for you to make a video on how sql injection works ? i ve learnt a bit of it but ur way of explaining makes it better
@m4a1mag sure I’ll add it to the list
@@plaintextpackets thanks :)
Not everything, a lot. For example, they surely know you use Signal, they might be able to corelate some of the people you're writing with, and when, but they don't know the content of your messages.
interesting
Everything u do will be laid bear to the coming generations.😅
☝️