Learn about networking and security with simple explanations for beginners, experts and everyone in between. We cover basic concepts, troubleshooting, security issues, coding and more!
This was really fascinating and well presented. Thanks!
@plaintextpackets18 сағат бұрын
Thank you!
@louisshade86242 күн бұрын
DUDE I LOVE YOU I LOVE YOUR CHANNEL PLZ KEEP UP THE FANTASTIC WORK u answer so many questions for me thanks a million
@plaintextpackets2 күн бұрын
No problem!
@JohnRobertPotter2 күн бұрын
Hey anyone can host a tor node, which means the NSA has a ton of tor node endpoints. Don't change the defaults and don't use a VPN unless you want DNS leakage
@louisshade86242 күн бұрын
question for you really i am asking to learn not to be a smart ass or anything but why is it bad to use a vpn ontop of tor just wondering
@JohnRobertPotter10 сағат бұрын
@@louisshade8624 The tour network is more difficult to detect than a VPN, so let's say if China is trying to tell where your traffic is going through if they see well-known VPN endpoints which are usually not trying to hide... They will be able to influence the VPN situation a lot easier basically or at least tell that you're using one. Whoever controls the endpoints controls the information flow and can probably figure some things out you or i don't think they can. It's best to just leave the defaults and run tor from a virtual machine using a third party burner phone for the connection
@ShriSumitJi2 күн бұрын
from where u learn these
@plaintextpackets2 күн бұрын
Do you mean how did I learn all this?
@shaunrowley72302 күн бұрын
Another excellent video and think for true anonymity using TOR use Tails tails.net/
@plaintextpacketsКүн бұрын
Great suggestion, nice to have it on a USB in your kit
@mikemaldanado60152 күн бұрын
Ed Snowden said the meta-data is enough to figure out what you're up to. They don't need to your actual data, just who you are connecting to , for how long, and how often.
@plaintextpackets2 күн бұрын
This
@fcgiova3 күн бұрын
Thank you very much for the content! Very clear and easy going. This comment is going to google to fill my profile (annoyed). One question about cookies, how it is harvested the way you're saying? I thought the cookie information could be read just for sites with same domain that the one who written it in first place. Maybe because they have scripts that execute other domain scripts inside? Like an embedded like button or something?
@plaintextpacketsКүн бұрын
Good question. Companies use shared ad networks which have common domains and can access cookies which were generated when accessing those sites.
@fcgiovaКүн бұрын
@@plaintextpackets here it goes my cookie, three cookies at least, watch, like and comment (I say this as a joke, not sure if this happens like that but it could). Thanks!
@repairstudio49403 күн бұрын
You can actually be anonymous but it is not a walk in the park. Lots of remote proxies ... TOR proxies have end points but they're varied although they can and many times are monitored hence why setting up a network of remote physical proxies internationally is the way to go... But again its not a simple task and a lot of trust goes into those in your isolated anonymous network. Proxy chains work... Nuff said....
@plaintextpackets18 сағат бұрын
Exactly. The average user can never really be expected to implement everything needed to be totally private
@mathieucaron49573 күн бұрын
How international criminal organizations are able to log into your Instagram/Facebook/etc. accounts even if you never click on their links?!?
@NahImPro3 күн бұрын
Weak password
@anonuser2603 күн бұрын
Trust me or not, they can see your web browser screen if they need to, i have seen it on my own eyes, idc what anyone says. Intercepting packets is nothing compared to this.
@mathieucaron49573 күн бұрын
They only "hack" criminals (or to spy) I guess... If they see your ip communicating with a terrorist, they would surely hack your pc/phone to get what they need. I don't know how they can do it, that would be interesting to learn 🤔
@Pipiopy4 күн бұрын
how can I find the profile they have on me?
@Dexter101x5 күн бұрын
You used cloudflare's ip address in this video, lol
@tyrojames99375 күн бұрын
YES!👍🏾
@DamjanDimitrioski5 күн бұрын
It knows I tried to connect with my router 1sec each hour, although my wan cable was disconnected and the router was powered off. Their diagnostic tools are poor :D.
@thienviet34296 күн бұрын
Can my isp see my full link? I mean my isp is able to see what I am doing from my link, don’t they? 9:08 If not, then I don’t have any questions.
@plaintextpackets5 күн бұрын
They can see the domain but not the full path
@garylove28367 күн бұрын
You could always use elons musk starlink with a vpn concentrator and you don’t need isp.
@plaintextpackets5 күн бұрын
Starlink is an ISP
@garylove28365 күн бұрын
@@plaintextpackets but the vpn concentrator will encrypt the traffic so the isp can’t see.
@plaintextpackets4 күн бұрын
@garylove2836 it’ll encrypt it between your home to the concentrator yes you’re right. From there the company who owns the concentrator or server it’s running on will be able to see
@garylove28364 күн бұрын
@@plaintextpackets oh I see.
@gf.calabretta7 күн бұрын
Google: "machine, learn this" ✌🏽
@dadadies7 күн бұрын
Are you censoring me or is youtube censoring me.
@skytechbits7 күн бұрын
ISP companies are regulated by the government so of course they can see everything everyone does.
@S_I_P_R_N_E_T7 күн бұрын
I am so glad I came across your channel. I am using NORDVPN via ASUS Router and OPENVPN but still....very informative. Keep up the good work.
@derickasamani57307 күн бұрын
I dislke this, if an attacker is already in your network blocking ping is the least of your worries
@plaintextpackets7 күн бұрын
Think corporate employees
@JamsODonnell1007 күн бұрын
Thanks so much. Really relatable. That you are able to demonstrate how things work in ‘real life’ use, is genius, to me. Next level tutorial.
@plaintextpackets7 күн бұрын
Glad it was helpful!
@codeman99-dev8 күн бұрын
Seems like the ISP's latency should also be measured at bare minimum. Any IP hosted directly by the ISP will do. Ideally you also correct all other latency values against the ISP value.
@plaintextpackets7 күн бұрын
Because the tool requires no config changes to run the first time I left that out but you can easily modify one of the targets to be your own ISP
@Azpalon8 күн бұрын
You are stupidly wrong. Your statement "Absolute privacy on the internet doesn't exist" is inaccurate, there are many forms of encryption and obfuscation. git gud.
@gamingink12527 күн бұрын
LOL
@plaintextpackets7 күн бұрын
Lool good morning to you too!
@benoit.gerin-lajoie8 күн бұрын
Yes BUT... how much will that monitoring hinder one's Internet activities like... looking at videos at the same time as browsing, etc... ?
@plaintextpackets7 күн бұрын
Uses very small amounts of bandwidth (if that’s your question)
@PracticalPcGuide8 күн бұрын
Very good video. easy to understand and follow. need another wireshark dns analysis tutorial using a program VPN vs vpn as a browser extension vs Tor browser. no dns showing while on tor..
@plaintextpackets7 күн бұрын
Noted
@user-tv4ki7yc1k8 күн бұрын
Why cant they inspect my device as this would solve my problem as the hackers would be caught but in Australia they are so useless that they lie to sell and investigations into fraud are not properly executed and they are enabling the hackers.
@mitchellsmith46018 күн бұрын
This guy is spreading FUD. All the popular websites use HTTPS, it’s only smaller websites without much traffic which don’t. Why? Because more than ten years ago, Google announced they would favor HTTPS websites over HTTP websites in their search results, which incentivized almost everyone to use HTTPS.
@Azpalon8 күн бұрын
I agree 100%, There are many protocols and methods to retain privacy over the internet. This dude doesn't know what he is talking about, or maybe it's on purpose and he wants to scare people for some weird reason.
@plaintextpackets7 күн бұрын
So I actually cover that in the vid, and explicitly state that ‘what’ it is you’re doing is mostly obfuscated by HTTPS these days. I also cover in the next vid how most of those popular websites share data on your activities anyhow via various tracking methods.
@maxvideodrome42156 күн бұрын
I own an ISP - we don’t look at anything.
@dustyskunk25575 күн бұрын
😂 Https means nothing for privacy
@cm987654321004 күн бұрын
Even With https deep packet inspection can see what type of services your using. What website you are connecting to even after changing dns as the host header is unencrypted(for now).They just can’t see the content.
@jwilk21078 күн бұрын
Excellent video brother...👍
@plaintextpackets7 күн бұрын
Thanks 👍
@Placesandspaces358 күн бұрын
I use Quad 9 for DNS which is known for exceptional privacy set on my router. My external firewall has an unbound feature with the option to set that to encryption over a 3rd party vpn. From what i understand Quad 9 is not based out of a country subject to the 14 Eyes Alliance and the 3rd party vpn i use also is not based in a country subject to those laws as well. It may not be a full proof setup but i try to make it as hard as possible for any 3rd parties to monitor my traffic. Great video!
@plaintextpackets7 күн бұрын
Yeah that’s the best you can do. I cover this in a video that’s coming out in a few weeks but basically get a good DNS, get some form of ad tracking for your network and potentially use secure DNS as well if your VPN doesn’t tunnel it
@Placesandspaces357 күн бұрын
@@plaintextpackets I need to check out that video. There was another one i saw that said be careful of using a vpn on all devices in a network because that can raise suspicion. With my external firewall i can pick out particular packets to send over a vpn without even putting the entire device on the vpn. I never was really into networking until a few years ago before I started learning what data entities can see ISPs, governments, etc.). Not to mention using public wifi which basically screams “look at me!”. 😅
@nigelholland249 күн бұрын
Great video learned a lot especially wireshark thanks
@plaintextpackets8 күн бұрын
Glad you enjoyed it
@ldandco9 күн бұрын
Does a VPN offer any authentic type of protection from this ? Or are VPN providers simply honeypots ?
@plaintextpackets8 күн бұрын
I don’t think they are all feeding their logs to authorities all the time, no. But I do believe any company can be compelled secretly to provide those logsZ
@ldandco8 күн бұрын
@@plaintextpackets Thanks ... I always thought about these well known VPN companies as a three letters organizations funded private companies that would "facilitate" information when needed. It is a centralized and easier way for them to get your data, rather than going to ISPs directly which would involve a bit more bureocracy and/or paperwork... but I may be wrong
@plaintextpacketsКүн бұрын
Good point. I'm doing a video on how VPNs work and I explain that you're basically shifting the trust domain to a different actor.
@nigelholland249 күн бұрын
Great video but now can you do a video on how to reduce all this .thanks
@plaintextpackets7 күн бұрын
It’s coming next week
@nigelholland247 күн бұрын
Great looking forward to it. Thank you.
@loreyoungtech9 күн бұрын
This is helpful content thanks.
@johnvardy95599 күн бұрын
Great Work
@feiwoza9 күн бұрын
Thank you -- !!
@feiwoza9 күн бұрын
Great video again -- please do let us know when you have the tutorial for installing probe on docker
@johnycache9 күн бұрын
Do you rate tailsOS?
@emanbuoy76739 күн бұрын
Ty
@user-rf7tz7pg8h9 күн бұрын
Nice one man! I don't know how, but you definitely found a niche here. Never seen this topic explained so clearly and straight-to-the-point, even though I am interested in it for more than a decade now (privacy/tracking). You've got a new fan! Keep up the good work (it is indeed GOOD!) ;)
@peterfrisch83739 күн бұрын
Yes, this REALLY works. I installed it on a Raspberry Pi 4 and had it set up by 2130 hours. The next day around 0930 hours there was a decrease in my download bandwidth (-75%). Called into my ISP support line. Went through the typical trouble shooting steps and they checked their end and of course they said everything was alright, but they sent out a tech to check anyway. However, I did show him what I saw. He asked if I could email it to him, and I did along with printing it as well. Later that same day a friend of mine, on the far side of the next county, was having the same issue. Yes, same ISP. The install was easy, but just a bit involved and I am so glad I went through the trouble.
@plaintextpackets9 күн бұрын
Great!
@shaunrowley72309 күн бұрын
Another great video the wider public do not have a clue and now that AI is using this data who knows what they know? Another database in the UK is again a marketing database but is what is known as the warranty database whenever you register for the warranty of a product whether online or via post all this data is stored in a database to send you details of future products, services etc. But here in the UK the database is avalabile to law enforcement and government agencies where for an example you have used your email address to login into a music download website but only last week you used the same email address to register a new laptop and added your phone and home address these details are now available and can be used to track you and if broken copyright laws there could be a knocking on your door.
@mx3389 күн бұрын
You can very specifically blame the US government and their agencies, as every other "western" government just cooperates with US intellegence, giving up access to their infrastructure, so they get some access to the globe dominating US spying network.
@mx3389 күн бұрын
One also theoretically problematic technology, is the prevelance of reverse proxy services/CDNs like CloudFlare or AWS CloudFront, which commonly cause a gap in TLS encryption, between your client and even smaller websites, that wouldn't be cooperating with intelegence.
@IOSALive9 күн бұрын
Plaintext Packets, I loved this video so much, I had to hit the like button!
@plaintextpackets9 күн бұрын
Thanks!
@joerockhead72469 күн бұрын
i watched it twice
@CyberAndy_9 күн бұрын
garbage
@aaronletchford9 күн бұрын
Would pi hole solve privacy, and stop the isp seeing your traffic
@plaintextpackets9 күн бұрын
Solves some, I will cover this in a video coming soon
@zadekeys21949 күн бұрын
No. :) That's what DNS over Https or TLS is for :)
@zadekeys21949 күн бұрын
Pi hole is just a local server, a middle man if you like. Requests still go to your ISP DNS, unless you configure your DNS to something like 9.9.9 .9or Ad-Guard DNS using secure DNS.
@justinception327710 күн бұрын
Have you ever thought of reading for Libra Vox?
@plaintextpackets9 күн бұрын
I haven't, don't have any books to publish :)
@justinception32779 күн бұрын
@@plaintextpackets I'd listen to your audiobook for sure.
Пікірлер
This was really fascinating and well presented. Thanks!
Thank you!
DUDE I LOVE YOU I LOVE YOUR CHANNEL PLZ KEEP UP THE FANTASTIC WORK u answer so many questions for me thanks a million
No problem!
Hey anyone can host a tor node, which means the NSA has a ton of tor node endpoints. Don't change the defaults and don't use a VPN unless you want DNS leakage
question for you really i am asking to learn not to be a smart ass or anything but why is it bad to use a vpn ontop of tor just wondering
@@louisshade8624 The tour network is more difficult to detect than a VPN, so let's say if China is trying to tell where your traffic is going through if they see well-known VPN endpoints which are usually not trying to hide... They will be able to influence the VPN situation a lot easier basically or at least tell that you're using one. Whoever controls the endpoints controls the information flow and can probably figure some things out you or i don't think they can. It's best to just leave the defaults and run tor from a virtual machine using a third party burner phone for the connection
from where u learn these
Do you mean how did I learn all this?
Another excellent video and think for true anonymity using TOR use Tails tails.net/
Great suggestion, nice to have it on a USB in your kit
Ed Snowden said the meta-data is enough to figure out what you're up to. They don't need to your actual data, just who you are connecting to , for how long, and how often.
This
Thank you very much for the content! Very clear and easy going. This comment is going to google to fill my profile (annoyed). One question about cookies, how it is harvested the way you're saying? I thought the cookie information could be read just for sites with same domain that the one who written it in first place. Maybe because they have scripts that execute other domain scripts inside? Like an embedded like button or something?
Good question. Companies use shared ad networks which have common domains and can access cookies which were generated when accessing those sites.
@@plaintextpackets here it goes my cookie, three cookies at least, watch, like and comment (I say this as a joke, not sure if this happens like that but it could). Thanks!
You can actually be anonymous but it is not a walk in the park. Lots of remote proxies ... TOR proxies have end points but they're varied although they can and many times are monitored hence why setting up a network of remote physical proxies internationally is the way to go... But again its not a simple task and a lot of trust goes into those in your isolated anonymous network. Proxy chains work... Nuff said....
Exactly. The average user can never really be expected to implement everything needed to be totally private
How international criminal organizations are able to log into your Instagram/Facebook/etc. accounts even if you never click on their links?!?
Weak password
Trust me or not, they can see your web browser screen if they need to, i have seen it on my own eyes, idc what anyone says. Intercepting packets is nothing compared to this.
They only "hack" criminals (or to spy) I guess... If they see your ip communicating with a terrorist, they would surely hack your pc/phone to get what they need. I don't know how they can do it, that would be interesting to learn 🤔
how can I find the profile they have on me?
You used cloudflare's ip address in this video, lol
YES!👍🏾
It knows I tried to connect with my router 1sec each hour, although my wan cable was disconnected and the router was powered off. Their diagnostic tools are poor :D.
Can my isp see my full link? I mean my isp is able to see what I am doing from my link, don’t they? 9:08 If not, then I don’t have any questions.
They can see the domain but not the full path
You could always use elons musk starlink with a vpn concentrator and you don’t need isp.
Starlink is an ISP
@@plaintextpackets but the vpn concentrator will encrypt the traffic so the isp can’t see.
@garylove2836 it’ll encrypt it between your home to the concentrator yes you’re right. From there the company who owns the concentrator or server it’s running on will be able to see
@@plaintextpackets oh I see.
Google: "machine, learn this" ✌🏽
Are you censoring me or is youtube censoring me.
ISP companies are regulated by the government so of course they can see everything everyone does.
I am so glad I came across your channel. I am using NORDVPN via ASUS Router and OPENVPN but still....very informative. Keep up the good work.
I dislke this, if an attacker is already in your network blocking ping is the least of your worries
Think corporate employees
Thanks so much. Really relatable. That you are able to demonstrate how things work in ‘real life’ use, is genius, to me. Next level tutorial.
Glad it was helpful!
Seems like the ISP's latency should also be measured at bare minimum. Any IP hosted directly by the ISP will do. Ideally you also correct all other latency values against the ISP value.
Because the tool requires no config changes to run the first time I left that out but you can easily modify one of the targets to be your own ISP
You are stupidly wrong. Your statement "Absolute privacy on the internet doesn't exist" is inaccurate, there are many forms of encryption and obfuscation. git gud.
LOL
Lool good morning to you too!
Yes BUT... how much will that monitoring hinder one's Internet activities like... looking at videos at the same time as browsing, etc... ?
Uses very small amounts of bandwidth (if that’s your question)
Very good video. easy to understand and follow. need another wireshark dns analysis tutorial using a program VPN vs vpn as a browser extension vs Tor browser. no dns showing while on tor..
Noted
Why cant they inspect my device as this would solve my problem as the hackers would be caught but in Australia they are so useless that they lie to sell and investigations into fraud are not properly executed and they are enabling the hackers.
This guy is spreading FUD. All the popular websites use HTTPS, it’s only smaller websites without much traffic which don’t. Why? Because more than ten years ago, Google announced they would favor HTTPS websites over HTTP websites in their search results, which incentivized almost everyone to use HTTPS.
I agree 100%, There are many protocols and methods to retain privacy over the internet. This dude doesn't know what he is talking about, or maybe it's on purpose and he wants to scare people for some weird reason.
So I actually cover that in the vid, and explicitly state that ‘what’ it is you’re doing is mostly obfuscated by HTTPS these days. I also cover in the next vid how most of those popular websites share data on your activities anyhow via various tracking methods.
I own an ISP - we don’t look at anything.
😂 Https means nothing for privacy
Even With https deep packet inspection can see what type of services your using. What website you are connecting to even after changing dns as the host header is unencrypted(for now).They just can’t see the content.
Excellent video brother...👍
Thanks 👍
I use Quad 9 for DNS which is known for exceptional privacy set on my router. My external firewall has an unbound feature with the option to set that to encryption over a 3rd party vpn. From what i understand Quad 9 is not based out of a country subject to the 14 Eyes Alliance and the 3rd party vpn i use also is not based in a country subject to those laws as well. It may not be a full proof setup but i try to make it as hard as possible for any 3rd parties to monitor my traffic. Great video!
Yeah that’s the best you can do. I cover this in a video that’s coming out in a few weeks but basically get a good DNS, get some form of ad tracking for your network and potentially use secure DNS as well if your VPN doesn’t tunnel it
@@plaintextpackets I need to check out that video. There was another one i saw that said be careful of using a vpn on all devices in a network because that can raise suspicion. With my external firewall i can pick out particular packets to send over a vpn without even putting the entire device on the vpn. I never was really into networking until a few years ago before I started learning what data entities can see ISPs, governments, etc.). Not to mention using public wifi which basically screams “look at me!”. 😅
Great video learned a lot especially wireshark thanks
Glad you enjoyed it
Does a VPN offer any authentic type of protection from this ? Or are VPN providers simply honeypots ?
I don’t think they are all feeding their logs to authorities all the time, no. But I do believe any company can be compelled secretly to provide those logsZ
@@plaintextpackets Thanks ... I always thought about these well known VPN companies as a three letters organizations funded private companies that would "facilitate" information when needed. It is a centralized and easier way for them to get your data, rather than going to ISPs directly which would involve a bit more bureocracy and/or paperwork... but I may be wrong
Good point. I'm doing a video on how VPNs work and I explain that you're basically shifting the trust domain to a different actor.
Great video but now can you do a video on how to reduce all this .thanks
It’s coming next week
Great looking forward to it. Thank you.
This is helpful content thanks.
Great Work
Thank you -- !!
Great video again -- please do let us know when you have the tutorial for installing probe on docker
Do you rate tailsOS?
Ty
Nice one man! I don't know how, but you definitely found a niche here. Never seen this topic explained so clearly and straight-to-the-point, even though I am interested in it for more than a decade now (privacy/tracking). You've got a new fan! Keep up the good work (it is indeed GOOD!) ;)
Yes, this REALLY works. I installed it on a Raspberry Pi 4 and had it set up by 2130 hours. The next day around 0930 hours there was a decrease in my download bandwidth (-75%). Called into my ISP support line. Went through the typical trouble shooting steps and they checked their end and of course they said everything was alright, but they sent out a tech to check anyway. However, I did show him what I saw. He asked if I could email it to him, and I did along with printing it as well. Later that same day a friend of mine, on the far side of the next county, was having the same issue. Yes, same ISP. The install was easy, but just a bit involved and I am so glad I went through the trouble.
Great!
Another great video the wider public do not have a clue and now that AI is using this data who knows what they know? Another database in the UK is again a marketing database but is what is known as the warranty database whenever you register for the warranty of a product whether online or via post all this data is stored in a database to send you details of future products, services etc. But here in the UK the database is avalabile to law enforcement and government agencies where for an example you have used your email address to login into a music download website but only last week you used the same email address to register a new laptop and added your phone and home address these details are now available and can be used to track you and if broken copyright laws there could be a knocking on your door.
You can very specifically blame the US government and their agencies, as every other "western" government just cooperates with US intellegence, giving up access to their infrastructure, so they get some access to the globe dominating US spying network.
One also theoretically problematic technology, is the prevelance of reverse proxy services/CDNs like CloudFlare or AWS CloudFront, which commonly cause a gap in TLS encryption, between your client and even smaller websites, that wouldn't be cooperating with intelegence.
Plaintext Packets, I loved this video so much, I had to hit the like button!
Thanks!
i watched it twice
garbage
Would pi hole solve privacy, and stop the isp seeing your traffic
Solves some, I will cover this in a video coming soon
No. :) That's what DNS over Https or TLS is for :)
Pi hole is just a local server, a middle man if you like. Requests still go to your ISP DNS, unless you configure your DNS to something like 9.9.9 .9or Ad-Guard DNS using secure DNS.
Have you ever thought of reading for Libra Vox?
I haven't, don't have any books to publish :)
@@plaintextpackets I'd listen to your audiobook for sure.
Great video!
Thanks!
⭐️👍⭐️