On 16/01/2020 6:13 pm, Kim Holburn wrote:

On 2020/Jan/16, at 5:54 pm, David <[email protected]> wrote:
Even with some form of secure & encrypted DNS from clients to trusted servers, 
ISPs could still see each web-page URL with the host name replaced by its resolved 
address.

That'd be very bad security.  As I understand it, the encrypted stream is 
established first, then the URL sent encrypted.  To do it the other way would 
be a security breach.

So the security agencies could still monitor an agent of interest, but selling 
users' browsing history would probably involve too much work to be worthwhile.

You're right, the TLS session is established first, then the HTTP session.  Not 
thinking...

However I was trying to make this point.  If an ISP client uses DNS & HTTP in the 
clear then it's obviously easy for their ISP to monitor their browsing history.  But if 
they use DOH/DOT & HTTPS the ISP still sees destination IP addresses, so monitoring 
is still possible if the ISP is prepared to look them up, but I suspect the business 
model begins to collapse.

A sensible "agent of interest" [to the security agencies] would be using a VPN 
no?

Yes, if they're using a VPN to a third-party intermediary and are technically 
aware, but I imagine the security agencies have ways of dealing with that sort 
of suspicious behaviour.  The IP address is more reliable than the text of a 
URL.

David
_______________________________________________
Link mailing list
[email protected]
http://mailman.anu.edu.au/mailman/listinfo/link

Reply via email to