• @Sam_Bass@lemmy.world
    link
    fedilink
    English
    0
    edit-2
    6 months ago

    Yes its a good thing the result is what it is, but you watch, theyll try to use it as justification. And as a small(ish) fyi, try running a tracert on whatever site youre looking at. Unless you are directly connected to that site, there are likely multiple hops -domains- that your connection passes through to get from your machine to the target. Each one of those has the potential to read what youre doing and reporting on it.

    • @PlexSheep@infosec.pub
      link
      fedilink
      English
      36 months ago

      Well not exactly. They might be reading the metadata of your lower level packages.

      Unless you’re not using encryption, then wth are you even doing?

      • @Sam_Bass@lemmy.world
        link
        fedilink
        English
        -1
        edit-2
        6 months ago

        You forget the nsa, interpol. I remember back in the 90s there was a blurb about hackers sniffing packets and using that data to hack those systems. Gotta remember back then everyone had more open ports than shanghai

        • @PlexSheep@infosec.pub
          link
          fedilink
          English
          56 months ago

          I mean yeah, maybe? Are you one of the people that believes aes or ecc has a backdoor? I think we’d know by now, and I’m certain they don’t have the compute to break aes256.

          • @Sam_Bass@lemmy.world
            link
            fedilink
            English
            -16 months ago

            Keep believing that. Just because all those ports are closed to you and me is no guaratee that theyre not being keyed for them