@@user-ev4ov6wr1d I feel like these conspiracies are all over out there and he's trying to make some sense out of them. I have a degree in computers and when people find out, they ask me all kinds of questions mostly about things in the news concerning computers. I feel like I have to field 20 questions all the time about them
An exemplary fable: -As a retired telecommunications technician (mostly telephony) I recall when I first started, the electromechanical switches needed checking every day to ensure they were actively connecting a call or were doing nothing and were just stuck with a fault. One of the most boring tasks you can imagine. Initially, I was amazed at having the ability to repeatedly monitor people's telephone conversations, but pretty soon all you wanted to do was go across the call for the minimum amount of time, just enough to hear a snatch of speech. However, if there was silence, it could be faulty, or someone may just be waiting for a reply. The protocol was to turn on your microphone and say in a questioning tone "Working?, i.e. is this a working connection. I still remember when I got a voice back saying "No, actually, I'm waiting for the Department of Labour to tell me about a job". 🙂
Sure it does and that's a fact and since I know it does I recently have taken precaution measures and changed the DNS settings in my Asus router; that DNS server is somewhere in Switzerland, called Quad9. What's very interesting is that Asus has information about what ISPs are doing and endowed their routers with Quad DNS settings. The only thing remaining is that the ISPs subscribers to be willing to make the switch from ISP's default DNS settings to other DNS servers.
I'd be more concerned about home WiFi with neighbors doing digital stealing and eavesdropping. I don't use WiFi in my house, but whenever a household device asks for WiFi, it will list 13 neighboring internet routers it can detect. A person that is IT savvy could have the capability to tap into any of those 13 neighboring internet connections. A couple of years ago when staying at a hotel, in the parking lot I witnessed two guys in a van, with antenna pots and a laptop, with what appeared to be eavesdropping/stealing WiFi signals, as I approached the vehicle from behind and we made close eye contact [close enough to see the laptop and the display], they quickly drove away.
Can IT engineer know what i search on my phone on their wifi if I connected to it in my work, I mean domain and path or they can see just domain Thanks
Thanks for this video, Please i have probleem: Why does Google Chrome open a new window each time instead of adding tabs to the existing window?i mean not links
"Why would they?" was my first thought on the topic. I know you go on to. talk about https later in the video, but your statement at the beginning about "can they monitor your email and web sites?" is a little misleading in that in general, these connections are SSL encrypted. Absolutely, though they can see the metadata about where you are connecting unless your are using a VPN or TOR. Other than that, excellent information :)
While your mail connection is encrypted, the mail itself is not. When it's stored on your ISP's (or email provider's) server awaiting the next leg of its journey, it's not encrypted.
@@askleonotenboom true. I was pointing at the clickbaityness of the beginning, worrying folks that the whole shebang of email is vulnerable to snooping before getting more specific later in the video.
As my dear old mom always used to say " If you've got nothing to hide then you've got nothing to worry about ". It's only criminals who need to be worried.
The WiFi , if you're connected to the WiFi is it the WiFi device they'll track or the phone connected to it? And what are the boundaries between device connected to a WiFi hotspot amd the ISP
usully its if yer doing something illigal on the net like something bad or piracy basically but if you use a vpn they cannot monitor yer internet connection because when you use vpn yer not using yer isp ip address yer using a different ip address from around the world
@@askleonotenboom Thanks, My Email is through Outlook and i can not see any successful login attacks through login History. I was on a call to ISP about a dispute. The timeline of been on phone and verifying my personal information to access my ISP account and minutes later after the phone call there was changes made without my authorization. They only could make changes if they had personal information i passed onto employee in the conversation we had employee and email access. And later that night i was charged several hundred dollars to the ISP I've contacted my ISP and they are saying my Email was Hacked. I can't see any successful unverified devices in my login history and my passwords were not changed to my email. They are doing a Investigation but they are blaming my email account for been hacked. No other accounts in relation to the email account has been compromised. I can't see any unusual activities in my email account. I've escalated this complaint, but i feel they are not taking my seriously and brushing me off. Just the ISP account.
It is blindingly obvious that your data has to exit the local loop (your cable, fibre or radio connection) into some form of aggregated pipe to the rest of the world. How is the ISP to know if it is working properly if they don't examine the datastream? At that point, they can do anything they like with the data. But it would cost them to do more than just check for errors. What ISP would want to spend millions on Petabytes of storage just to go thru all that data for the sake of a few Mb of idle interest? Otherwise, it would have to be real-time monitoring at the cost of more expensive hardware.
It's difficult to see how Starlink could do this. Data goes from me to a random (closest) satellite and from there to another random satellite(s) and from there to a ground station somewhere in the world. Basically all of the hundreds or thousands of satellites that go near my house would need to be be looking for my IP and doing something with the data, the overhead would be crazy.
@@drescherjm Kind of true but the satellites are not geostationary and the phased-array in the dish is continually flipping from one satellite to another as they move in and out of range. It takes about 90 minutes for a satellite to complete its orbit thus making the record any satellite could make choppy at best and certainly highly incomplete and practically useless for this task.
You mean random IP address? They will have a record of what IP address is assigned to what mac address of the modem or router that you use to connect to their service. How long they store that record is a different matter.
@drescherjm IP address! That's it! At 75, my brain is the habit of taking long walks without giving me prior notice or an invitation to come along. ;-) My point is that it's just another hurtle for anyone insane enough to want to track me. As he said in the video, most of us just aren't that interesting. I get hacked 2-6 times a year, but I taught networking for 6 years at a polytechnic, and it is my former students saying hello.
What if? Not sure I understand what you're asking? Assuming it's configured correctly (difficult to do, I've looked into it), your ISP will see only that you're using a VPN.
@@askleonotenboom Thanks for the reply. And sorry. I should be more specific. Around the 6:30-ish mark, you warned of replacing one problem (ISP spying) with another (VPN spying). So in an effort to prevent anyone from seeing my internet traffic, it seems I could host my own VPN -- either with a physical device such as a Raspberry Pi, or a virtual device. If I'm my own VPN service, would this solve the problem? I do like to tinker, and I'm just "itching" to try something like this in Proxmox. I _am_ familiar with type 2 virtualization, but I've never ventured into type 1. What are your thoughts? And thanks again.
@@BartFlossom Remember that the only thing a VPM connection protects is your connection TO the VPN. So if the VPN is a Raspberry Pi in your basement, sure your connections to it are secure, but it's connections out to the sites you want to visit are just as they were before/without it. Typically setting up a VPN is done by renting a server at a server/hosting farm and them implementing the VPN on that. That way your connections from your machines to your server at the server farm are secure. It's connections further outward remain as they were before. Maybe this article will clarify: askleo.com/how-does-a-vpn-protect-me/
Originally, ISPs weren't supposed to collect your usage data. A lobbyist for the ISPs was appointed head of FCC by Trump and he promptly paid back his employers by allowing ISPs to sell your data like Google does.