Posted on Mar 16, 2012 by rasengan

Your ISP is Going to Spy on You Starting July 12, 2012




Headless ManYour ISP is going to spy on you starting July 12, 2012.

One year ago, the RIAA and the MPAA organized a project with the largest internet service providers in the US to begin monitoring their customer’s internet activity.  This monitoring was introduced as a joint coalition to combat piracy.  A list of providers that are on board includes, but is not limited to, Time Warner, Comcast, Cablevision, Verizon and AT&T.

According to CNet’s Greg Sandoval, Cary Sherman of the RIAA has announced this week that deployments of the spying tools are nearly prepared and a tentative launch of July 12, 2012 has been set.

Reports indicate that there will be consequences for users who are caught pirating digital media.  First offenses may include forced educational rehabilitation as well as throttled connection speeds.  There have also been discussions stating that the top 200 websites will become inaccessible for users who are caught pirating.

However, the fact that ISPs are able to detect this activity indicates that they will be spying on their users.

Tips to protect your privacy

Using the internet, as well as using the internet to fileshare, is completely legal.  Here are ways to protect your privacy when engaging in legal activities:

1. Use an anonymous VPN service.  For us, not only is it obligatory to recommend a VPN, but in general, this is also the most widely accepted solution to privatize internet traffic.  VPN services provide tunnels which are completely encrypted.  Your ISP will not be able to monitor your connection.  Additionally, every application will communicate through the VPN without any manual configuration.  Bonus points for paying with anonymous crypto-currencies like Bitcoin, but for no log VPN services it is not necessary. UPDATE: Be sure to disable Google Web History and use Chrome in Incognito mode to gain even more privacy!

Difficult: Easy
Cost: Paid
Pros: All applications are encrypted.  Your ISP will not be able to spy on you.
Cons: Paid service.
Recommended: 

2. Use an ssh based SOCKS5 proxy.  You can run a local SOCKS5 proxy with the distributed ssh client in *nix and Mac OS X as well as PuTTY for Windows.  In Windows, simply set the options for PuTTy.   In Mac OS X and *nix, simply connect via SSH like:

ssh -D <port> (<user>@)<server>
Afterwards, simply open your application and manually configure it to connect to the SOCKS5 proxy running on the above specified port on the localhost (or 127.0.0.1). UPDATE: In FF, you will need to route DNS traffic through the ssh tunnel as well – enter “about:config” in the address bar and search for network.proxy.socks_remote_dns.  Set the value to true.

 

Difficulty: Medium
Cost: Paid (free if you already have a *nix shell)
Pros: Can be free if you already have a shell (like developers)
Cons: Manual configuration.  Does not protect all applications.
Recommended: 

 

UPDATE:

3. Tor is an amazing tool for obtaining privacy and anonymity.  For all your regular browsing needs, Tor is ideal, and best of all, it’s absolutely free.  However, Tor is not recommended when using heavy peer to peer file sharing protocols.

Difficult: Easy
Cost: Free
Pros: Very anonymous and completely free.
Cons: Slow and unable to do heavy p2p.
Recommended: 

UPDATE #2:
One reader has suggested a few options:
4. I2P
Protect your privacy.

 

About Andrew

Andrew is a long-time advocate of privacy and the conservation of the personal realm. He served as the brand manager for an internationally recognized best-selling product prior to co-founding Private Internet Access.


VPN Service

Leave a Reply to John Nevill Cancel reply

Your email address will not be published. Required fields are marked *

23 Comments

  1. Tim

    Running a local SOCKS5 proxy in the way you describe here won’t stop your ISP spying on you at all! All you’re doing with that is inserting a step between your browser and your ISP on your own network at home. The ISP still sees all the traffic that you put through the proxy. How did you think this could possibly help?

    You may connect to a *remote* proxy of course, but that, like VPN, is most likely a paid service.

    Very misleading.

    6 years ago
    Reply
    1. realrasengan

      Heya Tim,

      Maybe the words were a bit misleading, but when you connect with the ssh command as stated in the above article:

      ssh – D port user@server:disqus 

      you will actually be running a proxy that routes through the remote server.  This means it will be inherit the same properties of ssh — SSL baby!

      Hope this clears any confusion,
      rasengan

      6 years ago
      Reply
      1. John Nevill

        Wouldn’t the encryption only occur between the proxy server and the proxy client?  The server still has to grab the content requested by the client from the same non-secure sources that the client could connect directly too anyway.  At some point, a computer has to go out on the big unprotected internet to get the data and that server’s ISP can see what it’s doing. If that server is on the same computer, or network as the client, then your only adding overhead with no gain. I believe your only bet, if you don’t have a remote server to which you can SSH or VPN, is to use TOR. 

        6 years ago
        Reply
        1. realrasengan

          Hi John,

          Yes, you are right.  The ssh server that you are ssh’ing into must be remote and located in a datacenter outside of the ISPs that have decided to spy under this new graduated plan.

          In this case, then, your connection from your local machine to the remote ssh server will be encrypted, and therefore safe.

          6 years ago
          Reply
        2. shep

          All proxies suffer from the same limitation you are complaining about, including TOR. At some point the data becomes unencrypted. The advantage is that if a lot of people are using the same proxies/exit nodes, then it’s security through obscurity since noone can tell which traffic belonged to whom. As long as the proxy server is located outside the US, you should be fine. If it’s inside the US then the person running the proxy could be in trouble.

          6 years ago
          Reply
  2. BuzzCoastin

    > Use an anonymous VPN service.

    I have to use a VPn to scale the Great Firewall of China.
    So the net effect is that the US is now a step closer to China
    in its approach to internet freedom.
    In China the rights of the State and its elites are sacrosanct
    the rights of the people are subject to elite whims.
    Sound familiar Americans?

    Still Americans call it the land of the free;
    when in reality,
    it’s China in an Uncle Sam suit.

    6 years ago
    Reply
  3. Ming Liu

    Does tor router work?

    6 years ago
    Reply
    1. realrasengan

      Tor is an excellent choice for staying anonymous and, in conjunction with HTTPS everywhere, you will be secure.  However, it is generally not a good idea to engage in legal file sharing through Tor since it will be a bit slow.

      6 years ago
      Reply
      1. Jonah Henry

        Can you mention in the article, somewhere other than the pros/cons that you need an outside proxy? Cause that is very confusing to read.

        5 years ago
        Reply
  4. Jeff Bekcer

    No mentions of I2P and FreeNet? Really now?

    6 years ago
    Reply
  5. Rapsam2003

    I’m subscribing to a VPN service. Ugh…screw you, ISPs.

    5 years ago
    Reply
  6. Jeff Bekcer

    Right now I2P is not for people who just want to leech, it’s more of a group decentralized communities, however it has a LOT of promiseit’s what the users make it as far as content goes. https://www.i2p2.de

    VPN + Tor + FreeNet + I2P
    Use them all, not just one.

    5 years ago
    Reply
  7. blotteracid

    What about peerblock, is that a good program to use in this situation?

    5 years ago
    Reply
    1. Slothman757

      That question seems to just get ignored every time it’s asked on other websites, like it’s the stupidest question to ask or something. I really wouldn’t mind knowing myself.

      5 years ago
      Reply
  8. Dragolord09

    I feel stupid for asking this, but what about downloading comic books and the like?  Would that stuff be counted as digital media?

    5 years ago
    Reply
  9. Davidjones022

    I believe this a violation of the Fourth Amendment. The RIAA, MPAA and ISP’s should all be held accountable.     

    5 years ago
    Reply
  10. PrymeMickens

    I need $300,000. Please and Thank you.

    5 years ago
    Reply
    1. Disqusted_1

      Yeah no problem let me go shakedown my couch and I’ll wire that to ya ASAP.

      4 years ago
      Reply
      1. PrymeMickens

        No. Contact a loan originator , set up a meeting with a private lender…you silly human.

        4 years ago
        Reply
  11. Disqusted_1

    I had never heard of Freenet and decided to read up on it. It sounded pretty cool until I read this little tidbit on their ‘about’ page…

    “Users contribute to the network by giving bandwidth AND A PORTION OF THEIR HARD DRIVE (called the “data store”) for storing files. Files are automatically kept or
    deleted depending on how popular they are, with the least popular being discarded to make way for newer or more popular content. Files are encrypted, so generally the user cannot easily discover what is in his datastore, and hopefully can’t be held accountable for it.”

    Yeah that’s not cool at all.

    4 years ago
    Reply
  12. 1Bambinone

    I was reading that 96 percent of Internet users are opting for privacy while only 4 percent of users are trying to brake privacy. This is a battle where both sides are using a different type of military support. Where does this mess comes from? It comes from the lack of taxes to use the Internet. When internet users are looking for privacy and they don’t pay a tax it all means that someone has to pay a police force to catch the criinals using Internet. If the police gets paid by the government it is more likey that the federal police will finance the operations. The federal police will try to move from country to country even where there is no federal police or it is not welcomed. This conflict means one thing: every woman using the internet will soon or later be screwed by a either a military navy like person or by a federal agent like persone. It also means that there is nothing christian in this type of fornication. It means troubles. Internet users need to understand that no spy can be done in such conditions unless a tax is collected from the Service Providers and such tax being used to pay the police force necessary for the internet activities. Nobody sould be forced to pay any tax if they are not using the Internet, thus any spending done for the Internet is equal to spend money that belong to people that wish to do other type of activities rather than loosing their precious hours behind a computer screen. A military navy friendship also means that people will want to do things for free, like free software in the name of the Navy..and that is equal to the destruction of the small business or destruction of the dream to create a small business, it’s equal as well to do bad sexual activities meant to make happy a weird family based on immoral activites in the name of who knows what type of peace in the world or God knows what type of federal policeman. One more important point to consider is the fact that if people learn to be actors they can fake a crime against minors and any arrest of the suspect criminal could be subject to payments for damage in favor of the fake criminal because there cannot be a legal process against pure intentions. Just learn to be smart because the internet looks today more evil than ever before.

    9 months ago
    Reply