Plaintext Packets

Plaintext Packets

Learn about networking and security with simple explanations for beginners, experts and everyone in between. We cover basic concepts, troubleshooting, security issues, coding and more!

10 Ways Companies Track You Online

10 Ways Companies Track You Online

Пікірлер

  • @johnczech7074
    @johnczech707421 сағат бұрын

    This was really fascinating and well presented. Thanks!

  • @plaintextpackets
    @plaintextpackets18 сағат бұрын

    Thank you!

  • @louisshade8624
    @louisshade86242 күн бұрын

    DUDE I LOVE YOU I LOVE YOUR CHANNEL PLZ KEEP UP THE FANTASTIC WORK u answer so many questions for me thanks a million

  • @plaintextpackets
    @plaintextpackets2 күн бұрын

    No problem!

  • @JohnRobertPotter
    @JohnRobertPotter2 күн бұрын

    Hey anyone can host a tor node, which means the NSA has a ton of tor node endpoints. Don't change the defaults and don't use a VPN unless you want DNS leakage

  • @louisshade8624
    @louisshade86242 күн бұрын

    question for you really i am asking to learn not to be a smart ass or anything but why is it bad to use a vpn ontop of tor just wondering

  • @JohnRobertPotter
    @JohnRobertPotter10 сағат бұрын

    @@louisshade8624 The tour network is more difficult to detect than a VPN, so let's say if China is trying to tell where your traffic is going through if they see well-known VPN endpoints which are usually not trying to hide... They will be able to influence the VPN situation a lot easier basically or at least tell that you're using one. Whoever controls the endpoints controls the information flow and can probably figure some things out you or i don't think they can. It's best to just leave the defaults and run tor from a virtual machine using a third party burner phone for the connection

  • @ShriSumitJi
    @ShriSumitJi2 күн бұрын

    from where u learn these

  • @plaintextpackets
    @plaintextpackets2 күн бұрын

    Do you mean how did I learn all this?

  • @shaunrowley7230
    @shaunrowley72302 күн бұрын

    Another excellent video and think for true anonymity using TOR use Tails tails.net/

  • @plaintextpackets
    @plaintextpacketsКүн бұрын

    Great suggestion, nice to have it on a USB in your kit

  • @mikemaldanado6015
    @mikemaldanado60152 күн бұрын

    Ed Snowden said the meta-data is enough to figure out what you're up to. They don't need to your actual data, just who you are connecting to , for how long, and how often.

  • @plaintextpackets
    @plaintextpackets2 күн бұрын

    This

  • @fcgiova
    @fcgiova3 күн бұрын

    Thank you very much for the content! Very clear and easy going. This comment is going to google to fill my profile (annoyed). One question about cookies, how it is harvested the way you're saying? I thought the cookie information could be read just for sites with same domain that the one who written it in first place. Maybe because they have scripts that execute other domain scripts inside? Like an embedded like button or something?

  • @plaintextpackets
    @plaintextpacketsКүн бұрын

    Good question. Companies use shared ad networks which have common domains and can access cookies which were generated when accessing those sites.

  • @fcgiova
    @fcgiovaКүн бұрын

    @@plaintextpackets here it goes my cookie, three cookies at least, watch, like and comment (I say this as a joke, not sure if this happens like that but it could). Thanks!

  • @repairstudio4940
    @repairstudio49403 күн бұрын

    You can actually be anonymous but it is not a walk in the park. Lots of remote proxies ... TOR proxies have end points but they're varied although they can and many times are monitored hence why setting up a network of remote physical proxies internationally is the way to go... But again its not a simple task and a lot of trust goes into those in your isolated anonymous network. Proxy chains work... Nuff said....

  • @plaintextpackets
    @plaintextpackets18 сағат бұрын

    Exactly. The average user can never really be expected to implement everything needed to be totally private

  • @mathieucaron4957
    @mathieucaron49573 күн бұрын

    How international criminal organizations are able to log into your Instagram/Facebook/etc. accounts even if you never click on their links?!?

  • @NahImPro
    @NahImPro3 күн бұрын

    Weak password

  • @anonuser260
    @anonuser2603 күн бұрын

    Trust me or not, they can see your web browser screen if they need to, i have seen it on my own eyes, idc what anyone says. Intercepting packets is nothing compared to this.

  • @mathieucaron4957
    @mathieucaron49573 күн бұрын

    They only "hack" criminals (or to spy) I guess... If they see your ip communicating with a terrorist, they would surely hack your pc/phone to get what they need. I don't know how they can do it, that would be interesting to learn 🤔

  • @Pipiopy
    @Pipiopy4 күн бұрын

    how can I find the profile they have on me?

  • @Dexter101x
    @Dexter101x5 күн бұрын

    You used cloudflare's ip address in this video, lol

  • @tyrojames9937
    @tyrojames99375 күн бұрын

    YES!👍🏾

  • @DamjanDimitrioski
    @DamjanDimitrioski5 күн бұрын

    It knows I tried to connect with my router 1sec each hour, although my wan cable was disconnected and the router was powered off. Their diagnostic tools are poor :D.

  • @thienviet3429
    @thienviet34296 күн бұрын

    Can my isp see my full link? I mean my isp is able to see what I am doing from my link, don’t they? 9:08 If not, then I don’t have any questions.

  • @plaintextpackets
    @plaintextpackets5 күн бұрын

    They can see the domain but not the full path

  • @garylove2836
    @garylove28367 күн бұрын

    You could always use elons musk starlink with a vpn concentrator and you don’t need isp.

  • @plaintextpackets
    @plaintextpackets5 күн бұрын

    Starlink is an ISP

  • @garylove2836
    @garylove28365 күн бұрын

    @@plaintextpackets but the vpn concentrator will encrypt the traffic so the isp can’t see.

  • @plaintextpackets
    @plaintextpackets4 күн бұрын

    @garylove2836 it’ll encrypt it between your home to the concentrator yes you’re right. From there the company who owns the concentrator or server it’s running on will be able to see

  • @garylove2836
    @garylove28364 күн бұрын

    @@plaintextpackets oh I see.

  • @gf.calabretta
    @gf.calabretta7 күн бұрын

    Google: "machine, learn this" ✌🏽

  • @dadadies
    @dadadies7 күн бұрын

    Are you censoring me or is youtube censoring me.

  • @skytechbits
    @skytechbits7 күн бұрын

    ISP companies are regulated by the government so of course they can see everything everyone does.

  • @S_I_P_R_N_E_T
    @S_I_P_R_N_E_T7 күн бұрын

    I am so glad I came across your channel. I am using NORDVPN via ASUS Router and OPENVPN but still....very informative. Keep up the good work.

  • @derickasamani5730
    @derickasamani57307 күн бұрын

    I dislke this, if an attacker is already in your network blocking ping is the least of your worries

  • @plaintextpackets
    @plaintextpackets7 күн бұрын

    Think corporate employees

  • @JamsODonnell100
    @JamsODonnell1007 күн бұрын

    Thanks so much. Really relatable. That you are able to demonstrate how things work in ‘real life’ use, is genius, to me. Next level tutorial.

  • @plaintextpackets
    @plaintextpackets7 күн бұрын

    Glad it was helpful!

  • @codeman99-dev
    @codeman99-dev8 күн бұрын

    Seems like the ISP's latency should also be measured at bare minimum. Any IP hosted directly by the ISP will do. Ideally you also correct all other latency values against the ISP value.

  • @plaintextpackets
    @plaintextpackets7 күн бұрын

    Because the tool requires no config changes to run the first time I left that out but you can easily modify one of the targets to be your own ISP

  • @Azpalon
    @Azpalon8 күн бұрын

    You are stupidly wrong. Your statement "Absolute privacy on the internet doesn't exist" is inaccurate, there are many forms of encryption and obfuscation. git gud.

  • @gamingink1252
    @gamingink12527 күн бұрын

    LOL

  • @plaintextpackets
    @plaintextpackets7 күн бұрын

    Lool good morning to you too!

  • @benoit.gerin-lajoie
    @benoit.gerin-lajoie8 күн бұрын

    Yes BUT... how much will that monitoring hinder one's Internet activities like... looking at videos at the same time as browsing, etc... ?

  • @plaintextpackets
    @plaintextpackets7 күн бұрын

    Uses very small amounts of bandwidth (if that’s your question)

  • @PracticalPcGuide
    @PracticalPcGuide8 күн бұрын

    Very good video. easy to understand and follow. need another wireshark dns analysis tutorial using a program VPN vs vpn as a browser extension vs Tor browser. no dns showing while on tor..

  • @plaintextpackets
    @plaintextpackets7 күн бұрын

    Noted

  • @user-tv4ki7yc1k
    @user-tv4ki7yc1k8 күн бұрын

    Why cant they inspect my device as this would solve my problem as the hackers would be caught but in Australia they are so useless that they lie to sell and investigations into fraud are not properly executed and they are enabling the hackers.

  • @mitchellsmith4601
    @mitchellsmith46018 күн бұрын

    This guy is spreading FUD. All the popular websites use HTTPS, it’s only smaller websites without much traffic which don’t. Why? Because more than ten years ago, Google announced they would favor HTTPS websites over HTTP websites in their search results, which incentivized almost everyone to use HTTPS.

  • @Azpalon
    @Azpalon8 күн бұрын

    I agree 100%, There are many protocols and methods to retain privacy over the internet. This dude doesn't know what he is talking about, or maybe it's on purpose and he wants to scare people for some weird reason.

  • @plaintextpackets
    @plaintextpackets7 күн бұрын

    So I actually cover that in the vid, and explicitly state that ‘what’ it is you’re doing is mostly obfuscated by HTTPS these days. I also cover in the next vid how most of those popular websites share data on your activities anyhow via various tracking methods.

  • @maxvideodrome4215
    @maxvideodrome42156 күн бұрын

    I own an ISP - we don’t look at anything.

  • @dustyskunk2557
    @dustyskunk25575 күн бұрын

    😂 Https means nothing for privacy

  • @cm98765432100
    @cm987654321004 күн бұрын

    Even With https deep packet inspection can see what type of services your using. What website you are connecting to even after changing dns as the host header is unencrypted(for now).They just can’t see the content.

  • @jwilk2107
    @jwilk21078 күн бұрын

    Excellent video brother...👍

  • @plaintextpackets
    @plaintextpackets7 күн бұрын

    Thanks 👍

  • @Placesandspaces35
    @Placesandspaces358 күн бұрын

    I use Quad 9 for DNS which is known for exceptional privacy set on my router. My external firewall has an unbound feature with the option to set that to encryption over a 3rd party vpn. From what i understand Quad 9 is not based out of a country subject to the 14 Eyes Alliance and the 3rd party vpn i use also is not based in a country subject to those laws as well. It may not be a full proof setup but i try to make it as hard as possible for any 3rd parties to monitor my traffic. Great video!

  • @plaintextpackets
    @plaintextpackets7 күн бұрын

    Yeah that’s the best you can do. I cover this in a video that’s coming out in a few weeks but basically get a good DNS, get some form of ad tracking for your network and potentially use secure DNS as well if your VPN doesn’t tunnel it

  • @Placesandspaces35
    @Placesandspaces357 күн бұрын

    @@plaintextpackets I need to check out that video. There was another one i saw that said be careful of using a vpn on all devices in a network because that can raise suspicion. With my external firewall i can pick out particular packets to send over a vpn without even putting the entire device on the vpn. I never was really into networking until a few years ago before I started learning what data entities can see ISPs, governments, etc.). Not to mention using public wifi which basically screams “look at me!”. 😅

  • @nigelholland24
    @nigelholland249 күн бұрын

    Great video learned a lot especially wireshark thanks

  • @plaintextpackets
    @plaintextpackets8 күн бұрын

    Glad you enjoyed it

  • @ldandco
    @ldandco9 күн бұрын

    Does a VPN offer any authentic type of protection from this ? Or are VPN providers simply honeypots ?

  • @plaintextpackets
    @plaintextpackets8 күн бұрын

    I don’t think they are all feeding their logs to authorities all the time, no. But I do believe any company can be compelled secretly to provide those logsZ

  • @ldandco
    @ldandco8 күн бұрын

    @@plaintextpackets Thanks ... I always thought about these well known VPN companies as a three letters organizations funded private companies that would "facilitate" information when needed. It is a centralized and easier way for them to get your data, rather than going to ISPs directly which would involve a bit more bureocracy and/or paperwork... but I may be wrong

  • @plaintextpackets
    @plaintextpacketsКүн бұрын

    Good point. I'm doing a video on how VPNs work and I explain that you're basically shifting the trust domain to a different actor.

  • @nigelholland24
    @nigelholland249 күн бұрын

    Great video but now can you do a video on how to reduce all this .thanks

  • @plaintextpackets
    @plaintextpackets7 күн бұрын

    It’s coming next week

  • @nigelholland24
    @nigelholland247 күн бұрын

    Great looking forward to it. Thank you.

  • @loreyoungtech
    @loreyoungtech9 күн бұрын

    This is helpful content thanks.

  • @johnvardy9559
    @johnvardy95599 күн бұрын

    Great Work

  • @feiwoza
    @feiwoza9 күн бұрын

    Thank you -- !!

  • @feiwoza
    @feiwoza9 күн бұрын

    Great video again -- please do let us know when you have the tutorial for installing probe on docker

  • @johnycache
    @johnycache9 күн бұрын

    Do you rate tailsOS?

  • @emanbuoy7673
    @emanbuoy76739 күн бұрын

    Ty

  • @user-rf7tz7pg8h
    @user-rf7tz7pg8h9 күн бұрын

    Nice one man! I don't know how, but you definitely found a niche here. Never seen this topic explained so clearly and straight-to-the-point, even though I am interested in it for more than a decade now (privacy/tracking). You've got a new fan! Keep up the good work (it is indeed GOOD!) ;)

  • @peterfrisch8373
    @peterfrisch83739 күн бұрын

    Yes, this REALLY works. I installed it on a Raspberry Pi 4 and had it set up by 2130 hours. The next day around 0930 hours there was a decrease in my download bandwidth (-75%). Called into my ISP support line. Went through the typical trouble shooting steps and they checked their end and of course they said everything was alright, but they sent out a tech to check anyway. However, I did show him what I saw. He asked if I could email it to him, and I did along with printing it as well. Later that same day a friend of mine, on the far side of the next county, was having the same issue. Yes, same ISP. The install was easy, but just a bit involved and I am so glad I went through the trouble.

  • @plaintextpackets
    @plaintextpackets9 күн бұрын

    Great!

  • @shaunrowley7230
    @shaunrowley72309 күн бұрын

    Another great video the wider public do not have a clue and now that AI is using this data who knows what they know? Another database in the UK is again a marketing database but is what is known as the warranty database whenever you register for the warranty of a product whether online or via post all this data is stored in a database to send you details of future products, services etc. But here in the UK the database is avalabile to law enforcement and government agencies where for an example you have used your email address to login into a music download website but only last week you used the same email address to register a new laptop and added your phone and home address these details are now available and can be used to track you and if broken copyright laws there could be a knocking on your door.

  • @mx338
    @mx3389 күн бұрын

    You can very specifically blame the US government and their agencies, as every other "western" government just cooperates with US intellegence, giving up access to their infrastructure, so they get some access to the globe dominating US spying network.

  • @mx338
    @mx3389 күн бұрын

    One also theoretically problematic technology, is the prevelance of reverse proxy services/CDNs like CloudFlare or AWS CloudFront, which commonly cause a gap in TLS encryption, between your client and even smaller websites, that wouldn't be cooperating with intelegence.

  • @IOSALive
    @IOSALive9 күн бұрын

    Plaintext Packets, I loved this video so much, I had to hit the like button!

  • @plaintextpackets
    @plaintextpackets9 күн бұрын

    Thanks!

  • @joerockhead7246
    @joerockhead72469 күн бұрын

    i watched it twice

  • @CyberAndy_
    @CyberAndy_9 күн бұрын

    garbage

  • @aaronletchford
    @aaronletchford9 күн бұрын

    Would pi hole solve privacy, and stop the isp seeing your traffic

  • @plaintextpackets
    @plaintextpackets9 күн бұрын

    Solves some, I will cover this in a video coming soon

  • @zadekeys2194
    @zadekeys21949 күн бұрын

    No. :) That's what DNS over Https or TLS is for :)

  • @zadekeys2194
    @zadekeys21949 күн бұрын

    Pi hole is just a local server, a middle man if you like. Requests still go to your ISP DNS, unless you configure your DNS to something like 9.9.9 .9or Ad-Guard DNS using secure DNS.

  • @justinception3277
    @justinception327710 күн бұрын

    Have you ever thought of reading for Libra Vox?

  • @plaintextpackets
    @plaintextpackets9 күн бұрын

    I haven't, don't have any books to publish :)

  • @justinception3277
    @justinception32779 күн бұрын

    @@plaintextpackets I'd listen to your audiobook for sure.

  • @user-zz2ip7bx3y
    @user-zz2ip7bx3y10 күн бұрын

    Great video!

  • @plaintextpackets
    @plaintextpackets9 күн бұрын

    Thanks!

  • @tonyruiz2046
    @tonyruiz204610 күн бұрын

    ⭐️👍⭐️