Noob here. This is probably the most repeated question, but I don’t know the technical terms to make the appropiate digging online, and thought of asking humans before slopping my way around.
I don’t trust my ISP or the government above it.
The ISP remotely manages the local network! So I installed a router of my own and my devices only to that one.
I would like to encrypt (?) anything that goes out of my own router, so my ISP doesn’t evesdrop what I’m doing even if they want to (I know I know… if they really wanted, they could just send friends to my house).
Using Linux, Android GOS, and Pihole. They live under a “picked-up-from-a-shelf” router; and that router under theirs.
(I cannot get a different ISP)
Thanks
I also don’t trust my ISP nor my national government, which is the bulk of my private Internet use goes over a fail-close VPN.
I don’t trust my ISP or the government above it.
I think everyone here today doesn’t trust their ISP and government.
Use a #VPN or #TOR,Your ISP will only know the destination point, all traffic will be encrypted through a #tunnel
You said you installed a router. How did you configure the modem? In Full Bridge?
Also start changing your #DNS, don’t use your ISP’s default ones
My pihole serves dns. If not found, it goes directly to root tables (I forgot how they are called).
The router, I just connected its WAN port to the ISP’s switch/router/AP. Within the LAN under my router I have DHCP sending everybody to do lookups to the pihole. I don’t know what full bridge is.
The ISP’s modem/router/switch/AP, I cannot configure. It is a fucking “smart” brick remotely controlled.
@certified_expert
so the modem that you have from your ISP it is not possible to configure it as,ONT,Bridge or Full Bridge. 🤔Since you are just starting out, I recommend you start by subscribing to a VPN, (don’t use the free ones)
avoid tor for now, I use Mullvad which only allows 5 devices at the same time, but there are others, choose those that don’t keep logs.If you are able to set up OpenWRT on your router and run Mullvad through that, you can cover your whole network as one “device.”
I recommend everyone get their own modem/router if they are able to. ISP’s don’t provide them for free and you have no idea what monitoring they do with their hardware.
A VPN? That routes the traffic to the other server, so the ISP can only see you’re connecting to a VPN. Most people recommend Mullvad, I personally use Proton and Windscribe, both free, open source, and trusted.
Can it be installed at a network level, rather than at a device level (like pihole)?
You can run your VPN on your firewall (mine is opnsense, behind a cable modem in bridge mode). E.g. wireguard with Mullvad is a good option. Or you can set up a VPN client on your end devices – Mullvad gives you 5 endpoints for one account.
Yes, but support changes depending on your router. Not many in the consumer market support it, but you can run OpenWRT on either a supported router or a Linux box with at least two interfaces - a usb adapter works if you’re on a budget, and ethernet+WiFi also counts. I would suggest looking into VPN providers that support Wireguard, as that’s in my experience both faster and more reliable than OpenVPN.
For commercial alternatives you can just buy and import a wireguard conf file into, I know MikroTik routers support it and I believe GL.iNet does too. I’m pretty sure there are more, hopefully people can contribute their experiences.
I wouldn’t recommend TOR for this usecase btw, you’d be adding a lot of latency when you don’t need the additional anonymity layer.
Yes, GL.iNet routers have a VPN pane where you can simply enter the details of a WireGuard or OpenVPN server. I signed up for a free account at Proton, downloaded the configuration for a free WireGuard server, and installed it on the GL.iNet box. When I switch on the VPN in the router interface, all traffic flows through the VPN. I use it while travelling with my family. I can connect the travel router to the hotel or AirBnB wifi, then turn on the VPN (or not), then connect all the family devices to the travel router.
OP could do the same thing, assuming their router supports it, and set up a WireGuard VPN (much faster than OpenVPN) connection on the router and route all network traffic through it. A free VPN will always be slow and congested. A paid one is likely worthwhile in this case, especially if OP streams media.
yes it can technically, but I’ve more heard about tor box than vpn box, a pi or whatever should work for both ! But only if you can install a client for your vpn, because if you don’t have one I believe you have to download a .conf file for each IP of each server you want for your vpn but they change all the time.
VPN is the answer but keep in mind that you’re just moving the trust to the VPN (they can see your traffic).
The web uses a request/response architecture. Your computer requests a cat pic from the server and the server sends a cat pic back. Your real IP address must be in the request… otherwise the response cannot be routed back to you. VPNs act like couriers making requests and receiving responses on your behalf. So:
- The cat pic server sees traffic coming from the VPN provider and doesnt know who you are.
- The ISP sees encrypted traffic to the VPN but doesn’t know what it is.
- The VPN sees everything.
Most web traffic is already encrypted with TLS but not the domain names and IPs (needed for routing).
If you really want to be anonymous on the web, use tor, but it’s slow and many websites block tor exit nodes so you will have a degraded experience.
If I use VPN, my isp will see that I send and receive gibblish to and from a single address (the vpn server), all over port 443, right?
If I use TOR, what does my ISP see?
Itll go over a different port depending on the vpn protocol (i recommend wireguard). So the isp will know it’s vpn gibberish, but there are ways to tunnel the ciphertext through https again (like wstunnel). A bit overkill for your setup but comes in handy if you need to break through firewalls (if you are in china and wireguard ports are blocked but 443 is allowed)
If you use tor, your isp sees tor traffic (gibberish) but tor also supports obfuscation to make it look like http. All you need to use tor is tor browser (mobile apps exist too) so try it out… It’s free but you will see the limitations I mentioned.
- yes
- the same, but probably to an even more unknown IP that is also changing frequently. the content itself should look equally random
A trustworthy VPN provider is your best solution here. Mullvad, IVPN, and ProtonVPN are common recommendations in the community. I would personally recommend against Windscribe; it is privacy-friendly but has had major bugs repeatedly in the past. If you want to go experimental, check out NymVPN and Obscura (Apple platforms only).
While we’re recommending/not recommending vpns, don’t use PIA. they WERE the go to. But they’re owned by an American company now and based there.
On top of client VPNs you might consider the possible other freebies from yr ISP such as router, WiFi access points and other network elements they provide you with. Set-op-boxes as well. All those equipments are absolutely ratting you as much as possible. Also any software including mobile apps they provide for support / billing / whatever.
I think I am not understanding this comment. I’m saying I don’t trust the ISP. Why would I invade my house and phone with more of their gadgets?
They don’t provide you any equipment ? Then good. It’s very typical for them to do so.
Get a VPN. This is 50% of what they’re for.
What is the other 50%? How is a VPN trustworthy?
You’re asking the right questions.
VPNs aren’t much safer. You’re putting your trust in a vpn company instead of an isp. If the vpn company is compromised (such as with Pia) then you’re no better off than if you’d not used the vpn. Tor isn’t that much safer these days since the nsa runs Tor exit nodes. Best bet is a no logging vpn. Though you’re again putting your trust in them that they actually don’t log. Whether or not they do is only known to them.
I think the nsa is not going to cast doubts over tor by leaking information from normal people or small fry criminals like pirates. and if you’re a dissident from a different country than usa, it’s probably also fine. I’m a lot more worried about the vpns that pay or own vpn review sites or have ties to surveillance companies
Other than a VPN, use a privacy respecting DoH provider on your router so all your devices use that instead of your ISP for DNS.
My router’s DHCP service is pointing clients to the pihole for DNS. Should I run that on HTTPS too? Can the pi do that?
It’s not necessary for the pihole to run over HTTPS, because that would only encrypt traffic between the pi and your device within your own network. When the pi doesn’t have the DNS that your device requests, it looks it up from the internet. You’ve probably set the DNS lookup servers in pihole. That’s a good start to avoid your ISP. The servers you choose may support DoH, and. you should use ones that do. That way, when the pi sends a DNS lookup to the internet, via your ISP, it’s encrypted by HTTPS so your ISP can’t inspect it.
Once you put a VPN on your router, be sure to have a few servers setup so if one isn’t behaving right you can log into your router and quickly switch servers.
How can I install a VPN client in a router? A simple soho device, like those tplink, dlink, asus… It doesn’t support openwrt.
The software must support it. If OpenWRT isn’t an option then maybe another software is such as DD-WRT or FreshTomato or sometimes the OEM software does too. You could also put a dedicated firewall device before your router with OPNsense and put a VPN on that







