←back to thread

1895 points _l4jh | 1 comments | | HN request time: 0s | source
Show context
slowsun ◴[] No.16728958[source]
> What many Internet users don't realize is that even if you're visiting a website that is encrypted — has the little green lock in your browser — that doesn't keep your DNS resolver from knowing the identity of all the sites you visit. That means, by default, your ISP, every wifi network you've connected to, and your mobile network provider have a list of every site you've visited while using them.

> Network operators have been licking their chops for some time over the idea of taking their users' browsing data and finding a way to monetize it.

The "1.1.1.1 stops ISPs/Starbucks from selling your browsing history" pitch is untrue and, given Cloudflare's expertise, seems disingenuous.

HTTPS transmits domains unencrypted in request headers, to support SNI. So even if DNS lookups are completely hidden, my ISP can still log all domains I visit by inspecting my HTTP(S) requests.

And the domain log from my web requests is more valuable than my DNS log. Advertisers and data aggregators can see the true timing and frequency of my browsing history, whereas a DNS log is affected by router/OS/browser lookup caching.

replies(1): >>16729372 #
QasimK ◴[] No.16729372[source]
It’s a step in the right direction. Also is TLS1.3. not supposed to encrypt SNI?
replies(2): >>16729841 #>>16732113 #
1. djsumdog ◴[] No.16732113[source]
I thought this was one of the big contentious issues with TLS1.3, that got resolved in a recent spec approval?