@Morgikan@lemm.ee avatar

Morgikan

@Morgikan@lemm.ee

This profile is from a federated server and may be incomplete. Browse more on the original instance.

Morgikan,
@Morgikan@lemm.ee avatar

The DNS modification is slightly off. Some ISPs check UDP packets since they are insecure and will modify query results regardless of the DNS server you are sending to. Mediacom is known to do this for their billing and DMCA systems. They use DNS redirection to assist in MITMing the connection to load their own certificate to your browser. With that done, they can prepend their own Javascript to the response they receive from whatever web server you are trying to contact. That’s how they get their data usage and DMCA popups loaded when you load up whatever site.

Morgikan,
@Morgikan@lemm.ee avatar

Even if it is not being done for a malicious reason, it is still a malicious practice. Websites can help prevent this by adopting wildcard Subject Alternate Names in their certificates thereby making the redirection much less likely to succeed, but you shouldn’t have to view your own ISP as a threat actor.

deleted_by_author

  • Loading...
  • Morgikan,
    @Morgikan@lemm.ee avatar

    How does a private tracker ensure that it hasn’t been compromised though? From my understanding they largely disallow the use of VPNs, although perhaps that isn’t true of all private trackers. Still, this user for example could be a bad actor and he was just given an invite code without any sort of check being done.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • localhost
  • All magazines
  • Loading…
    Loading the web debug toolbar…
    Attempt #