I kinda don’t trust my home network because my brother is douche and I feel like he’s gonna do some weird things with the connection, so I prefer to juse use my phone’s data (unlimited data plan) to avoid any shenanigans. Hypothetically, how much harm can an evil wifi do?

Does using HTTPS avoid all risks? What about evey program on your computer or every app on your phone, do they also have HTTPS everywhere on? (I use Android btw)

How much could a VPN do better that HTTPS cant?

  • @[email protected]
    link
    fedilink
    English
    2519 hours ago

    As others have mentioned, DNS is probably your worst enemy. It doesn’t take much technical knowledge to just create a DNS server and start logging all domains you’re accessing. Say, to tell mom how often you’re browsing porn or something.

    Manually configuring DNS servers in your OS would resolve this issue, but also using VPN like mullivad would just bypass such worries with 99% certainty.

    Or just keep using mobile data, because why not

    • @[email protected]
      link
      fedilink
      English
      07 hours ago

      Or just keep using mobile data

      That merely moves it to the carrier knowing, though, right?

      • @[email protected]
        link
        fedilink
        English
        37 hours ago

        Nope, but OP mentioned in the post that they’re sketched off from their brother who’s in control of the home network

    • @Peffse
      link
      619 hours ago

      Correct me if I’m wrong but- manually configuring your DNS in the OS would still enable traffic monitoring, wouldn’t it? I always thought DNS traffic is not encrypted by default.

      • @pHr34kY
        link
        15 hours ago

        I’ve configured my home wifi to capture all DNS regardless of its intended recipient. It’s unencrypted so it’s possible.

        I also use encrypted DNS on my phone.

      • @[email protected]
        link
        fedilink
        English
        2119 hours ago

        Generally true. You would want to use DNS-over-TLS (DoT) or DNS-over-HTTPS (DoH) to be sure your DNS queries are encrypted in transit.

        • @root
          link
          412 hours ago

          Technically if you have a NAT redirect rule that routes all outbound traffic on a specific port, you could redirect to port 53 on the pihole and it would be visible because the DoT/ DoH terminates at the Pi which his brother could control? VPN is still a safe bet.

          • @[email protected]
            link
            fedilink
            English
            3
            edit-2
            9 hours ago

            You can redirect regular DNS like that, but DoH/DoT is encrypted using certificates with a chain of trust just like any other tls connection (that’s kind of the whole point). It would throw security errors breaking dns resolution if you redirected the connection to your own server.

            You would still be better off with a vpn wrapping the connection however as the SNI in each https connection is unencrypted and can be used to log your traffic.

            • @root
              link
              39 hours ago

              That’s true. Was going to setup a NAT rule to test it out but then realized that there’s no way I can redirect outbound traffic on 443 to a Pi Hole on 53, lol.

      • @[email protected]
        link
        fedilink
        English
        417 hours ago

        Oh, yeah you’re absolutely correct. I was fixated too much on the DNS logging lol

        DoH (DNS over HTTPS) or DoT (DNS over TLS) would fix that

        • @[email protected]
          link
          fedilink
          615 hours ago

          Actually no. The SNI is still not encrypted. So every site you are visiting can still be sniffed.