top | item 23299259

(no title)

baicunko | 5 years ago

This is something that the average user fails to understand. One thing is saying I don't care they check on what I visit but once you aggregate enough information, it can become something of a "Big Brother".

With enough DNS data I can assure you I can see when you leave to work, get back, determine the moment when you leave for vacation and no one is home, etc.

discuss

order

sirn|5 years ago

(Disclosure: I'm Thai)

Especially in Thailand, where free speech is almost non-existent.

Few months ago there were Twitter user who goes by the name "Anonymous" ("นิรนาม" in Thai) who have been arrested for spreading fake news and being a threat to the country. The Twitter user mainly tweets about topics subjected to lèse-majesté law. He never leave any traces, which leaves question on how officials managed to track him down if Twitter claims they didn't received any requests from our government.

My small group of friend came up with one scenario where official sent a honeypot URL via Twitter DM, then trace him via DNS query logs. This is assuming the scenario where he don't click on random links and using a browser that performs DNS prefetching of sorts. Everyone thought it was unlikely at the time, partly because nobody thought ISP would actually logging all DNS queries.

Apparently, all of us were wrong, at least on the latter.

WildGreenLeave|5 years ago

Just for my understanding: this wouldn't have happened if the user in question would've used a VPN and/or TOR right?

Don't get me wrong, I really don't like this in Thailand and it's absurd that you would even need something like that. As a foreigner visiting Thailand I don't feel that comfortable with my browsing habits. Usually I trust a local provider enough to just browse and not care about what I'm looking up, Thailand is not one of those places and I always use a VPN. (Mostly routed to Singapore)

postcynical|5 years ago

But aren't all the URLs in the messages/notifications "shortened" to a t.co/. So he would have had to click on the link.

TeMPOraL|5 years ago

Related: there's no such thing as "anonymized data", there's only "anonymized until correlated with enough other datasets".

mindslight|5 years ago

I hope someone takes the opportunity to download the entire database and serve it up as a torrent, because it would make a great source for studying the pictures that can be painted with contemporary ISP surveillance.

cbg0|5 years ago

You wouldn't even need DNS data, just how much Internet traffic a specific connection or device is using is enough to determine these things.