Your ISP is Going to Spy on You Starting July 12, 2012

Posted on Mar 16, 2012 by rasengan

Headless ManYour ISP is going to spy on you starting July 12, 2012.

One year ago, the RIAA and the MPAA organized a project with the largest internet service providers in the US to begin monitoring their customer’s internet activity.  This monitoring was introduced as a joint coalition to combat piracy.  A list of providers that are on board includes, but is not limited to, Time Warner, Comcast, Cablevision, Verizon and AT&T.

According to CNet’s Greg Sandoval, Cary Sherman of the RIAA has announced this week that deployments of the spying tools are nearly prepared and a tentative launch of July 12, 2012 has been set.

Reports indicate that there will be consequences for users who are caught pirating digital media.  First offenses may include forced educational rehabilitation as well as throttled connection speeds.  There have also been discussions stating that the top 200 websites will become inaccessible for users who are caught pirating.

However, the fact that ISPs are able to detect this activity indicates that they will be spying on their users.

Tips to protect your privacy

Using the internet, as well as using the internet to fileshare, is completely legal.  Here are ways to protect your privacy when engaging in legal activities:

1. Use an anonymous VPN service.  For us, not only is it obligatory to recommend a VPN, but in general, this is also the most widely accepted solution to privatize internet traffic.  VPN services provide tunnels which are completely encrypted.  Your ISP will not be able to monitor your connection.  Additionally, every application will communicate through the VPN without any manual configuration.  Bonus points for paying with anonymous crypto-currencies like Bitcoin, but for no log VPN services it is not necessary. UPDATE: Be sure to disable Google Web History and use Chrome in Incognito mode to gain even more privacy!

Difficult: Easy
Cost: Paid
Pros: All applications are encrypted.  Your ISP will not be able to spy on you.
Cons: Paid service.

2. Use an ssh based SOCKS5 proxy.  You can run a local SOCKS5 proxy with the distributed ssh client in *nix and Mac OS X as well as PuTTY for Windows.  In Windows, simply set the options for PuTTy.   In Mac OS X and *nix, simply connect via SSH like:

ssh -D <port> (<user>@)<server>
Afterwards, simply open your application and manually configure it to connect to the SOCKS5 proxy running on the above specified port on the localhost (or UPDATE: In FF, you will need to route DNS traffic through the ssh tunnel as well – enter “about:config” in the address bar and search for network.proxy.socks_remote_dns.  Set the value to true.


Difficulty: Medium
Cost: Paid (free if you already have a *nix shell)
Pros: Can be free if you already have a shell (like developers)
Cons: Manual configuration.  Does not protect all applications.



3. Tor is an amazing tool for obtaining privacy and anonymity.  For all your regular browsing needs, Tor is ideal, and best of all, it’s absolutely free.  However, Tor is not recommended when using heavy peer to peer file sharing protocols.

Difficult: Easy
Cost: Free
Pros: Very anonymous and completely free.
Cons: Slow and unable to do heavy p2p.

One reader has suggested a few options:
4. I2P
Protect your privacy.


VPN Service

Comments are closed.


  1. 1Bambinone

    I was reading that 96 percent of Internet users are opting for privacy while only 4 percent of users are trying to brake privacy. This is a battle where both sides are using a different type of military support. Where does this mess comes from? It comes from the lack of taxes to use the Internet. When internet users are looking for privacy and they don’t pay a tax it all means that someone has to pay a police force to catch the criinals using Internet. If the police gets paid by the government it is more likey that the federal police will finance the operations. The federal police will try to move from country to country even where there is no federal police or it is not welcomed. This conflict means one thing: every woman using the internet will soon or later be screwed by a either a military navy like person or by a federal agent like persone. It also means that there is nothing christian in this type of fornication. It means troubles. Internet users need to understand that no spy can be done in such conditions unless a tax is collected from the Service Providers and such tax being used to pay the police force necessary for the internet activities. Nobody sould be forced to pay any tax if they are not using the Internet, thus any spending done for the Internet is equal to spend money that belong to people that wish to do other type of activities rather than loosing their precious hours behind a computer screen. A military navy friendship also means that people will want to do things for free, like free software in the name of the Navy..and that is equal to the destruction of the small business or destruction of the dream to create a small business, it’s equal as well to do bad sexual activities meant to make happy a weird family based on immoral activites in the name of who knows what type of peace in the world or God knows what type of federal policeman. One more important point to consider is the fact that if people learn to be actors they can fake a crime against minors and any arrest of the suspect criminal could be subject to payments for damage in favor of the fake criminal because there cannot be a legal process against pure intentions. Just learn to be smart because the internet looks today more evil than ever before.

    4 years ago
  2. Disqusted_1

    I had never heard of Freenet and decided to read up on it. It sounded pretty cool until I read this little tidbit on their ‘about’ page…

    “Users contribute to the network by giving bandwidth AND A PORTION OF THEIR HARD DRIVE (called the “data store”) for storing files. Files are automatically kept or
    deleted depending on how popular they are, with the least popular being discarded to make way for newer or more popular content. Files are encrypted, so generally the user cannot easily discover what is in his datastore, and hopefully can’t be held accountable for it.”

    Yeah that’s not cool at all.

    7 years ago
  3. PrymeMickens

    I need $300,000. Please and Thank you.

    8 years ago
    1. Disqusted_1

      Yeah no problem let me go shakedown my couch and I’ll wire that to ya ASAP.

      7 years ago
      1. PrymeMickens

        No. Contact a loan originator , set up a meeting with a private lender…you silly human.

        7 years ago