• Sam_Bass@lemmy.world
    link
    fedilink
    English
    arrow-up
    0
    ·
    edit-2
    4 months ago

    Yes its a good thing the result is what it is, but you watch, theyll try to use it as justification. And as a small(ish) fyi, try running a tracert on whatever site youre looking at. Unless you are directly connected to that site, there are likely multiple hops -domains- that your connection passes through to get from your machine to the target. Each one of those has the potential to read what youre doing and reporting on it.

    • PlexSheep@infosec.pub
      link
      fedilink
      English
      arrow-up
      0
      ·
      4 months ago

      Well not exactly. They might be reading the metadata of your lower level packages.

      Unless you’re not using encryption, then wth are you even doing?

      • Sam_Bass@lemmy.world
        link
        fedilink
        English
        arrow-up
        0
        ·
        edit-2
        4 months ago

        You forget the nsa, interpol. I remember back in the 90s there was a blurb about hackers sniffing packets and using that data to hack those systems. Gotta remember back then everyone had more open ports than shanghai

        • PlexSheep@infosec.pub
          link
          fedilink
          English
          arrow-up
          0
          ·
          4 months ago

          I mean yeah, maybe? Are you one of the people that believes aes or ecc has a backdoor? I think we’d know by now, and I’m certain they don’t have the compute to break aes256.

          • Sam_Bass@lemmy.world
            link
            fedilink
            English
            arrow-up
            0
            ·
            4 months ago

            Keep believing that. Just because all those ports are closed to you and me is no guaratee that theyre not being keyed for them

            • PlexSheep@infosec.pub
              link
              fedilink
              English
              arrow-up
              0
              ·
              4 months ago

              Yeah sure. There is no perfect security, but your paranoia is not only impractical but conspiratory.