TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Surveillance capitalism will transform the domain name system

79 pointsby asix66over 3 years ago

11 comments

0xbadcafebeeover 3 years ago
I hate to be the bearer of bad news, but this isn&#x27;t fixable at the DNS level.<p>I can&#x27;t remember when it was first researched, but sometime after the birth of Tor, there was increased interest by DoD and others to track connections over an obscured network. The end result was a paper that showed you could identify the sources and destinations of traffic solely by monitoring aggregate traffic over major routes in the network. In essence, for completely encrypted tunnels, you could know exactly what user was using what Tor exit node, assuming you had enough network sensors spread out and enough sample data. There was also the possibility of discovering Tor hidden nodes and what users were using them.<p>Therefore, regardless of traffic (ex. DNS), if you have the <i>motive</i> to find out who is doing what on the internet, and the capital and access for the network sensors, you can find out who&#x27;s going where (and even <i>doing what</i> to a certain extent).<p>The more traffic is encrypted, and the more we push for more privacy and more difficult we make it to monetize our network access, the more reason they have to increase their surveillance, so they can continue to fund all these products and technologies we take for granted.<p>The cause of an arms race isn&#x27;t arms. It&#x27;s the inability to come to terms on an issue. We should be addressing the issue, not ramping up our weapons research. I know this isn&#x27;t a &quot;sexy solution&quot;, but it would definitely free up our time to worry about more important or interesting things.
评论 #28568594 未加载
lifepillarover 3 years ago
I have configured local Unbound to use four different open DNS provideds, round-robin, the rationale being each one gets 1&#x2F;4th of requests. On the other hand, I am sending requests to four providers instead of one, so I have to trust four providers instead of one. What’s better?
评论 #28568598 未加载
评论 #28567889 未加载
评论 #28569977 未加载
评论 #28567884 未加载
评论 #28567583 未加载
raspyberrover 3 years ago
This sounds like Tor but for DNS.
评论 #28568831 未加载
maybenotafartover 3 years ago
so we will make our own DNS system with blackjack and hookers
评论 #28567151 未加载
lazyeyeover 3 years ago
&quot;One way to make DNS surveillance more difficult is to use a public open DNS server, such as Google&#x27;s 8.8.8.8...&quot;<p>Lol
评论 #28568841 未加载
1vuio0pswjnm7over 3 years ago
&quot;Knowing the domain names of the websites you visit, or servers that apps access on your behalf, is valuable intelligence. DNS traffic is especially valuable because it reflects what users are doing in real time.<p>&quot;The names you asked for, and when you ask for them, say an awful lot about you,&quot; Huston said in his presentation to the APNIC 52 conference on Wednesday.&quot;<p>This goes on the assumption that a DNS request and HTTP request are coupled in time. They can be decoupled.<p>Ive been gathering DNS data in bulk for many years. This can be done, e.g., by making UDP&#x2F;TCP DNS requests to the appropriate authoritative nameservers, making UDP&#x2F;TCP requests to DNS caches run by third parties (this is what developers seems to prefer; its an inefficient, inconsiderate and braindead method, IMO), extracting the data from public scan datasets available for download, extracting from passive DNS datasets, and most recently making pipelined HTTP requests to DoH servers over a single TCP connection. Its good to have multiple sources of DNS data so one can note any differences.<p>A surveillance capitalist acting as a passive DNS data or DoH provider could be observing this data gathering but it would be difficult to connect any subsequent HTTP requests, separated in time, days, months or years later, with particular domainnames. With the way CDNs are used today, a large percentage of these domainnames can be requested from the same IP address. Obviously CDNs can have troves of data on users&#x27; browsing habits. Perhaps surveillance capitalists approach CDNs to get data about users.<p>What this article fails to mention is TLS 1.2 leaking domainnames in certificates and SNI extensions, in plaintext. Using third party DNS like Google, or even &quot;Oblivious DNS&quot; wont stop ISPs and others on path from seeing every domainname for every site the customer visits. TLS 1.3 with ESNI will fix this but its still experimental and Cloudflare is the only host I am aware of that supports it. Nevertheless I use it and it works well. For non-Cloudflare sites that require SNI (its quite a small of the sites submitted to HN) I use archive.org. Of course, I am trusting that archive.org isnt engaged in &quot;surveillance capitalism&quot;. :) Another trick for Cloudfront hosted sites is one can use the [hash].cloudfront.net domainnname for SNI instead of the &quot;real&quot; domainname. If only mall number of customers are doing this, it makes more work for ISPs or marketers for very small reward, but its a trivial amount of work. Archive.org is the best solution I have so far.<p>For recreational web use, I have stopped using DNS altogether. I let the forward proxy store the IP address info for each host in memory. Its very fast.
评论 #28567139 未加载
评论 #28568264 未加载
jl2718over 3 years ago
Same problem as TOR; the servers can share information. DNS seems like a good service for homomorphic PIR.
thanksforfishover 3 years ago
&gt; One way to make DNS surveillance more difficult is to use a public open DNS server, such as Google&#x27;s 8.8.8.8<p>I assumed Google ran 8.8.8.8 to collect data for targeted advertising, as one of the major players in surveillance capitalism. Am I mistaken?
评论 #28567666 未加载
评论 #28568161 未加载
评论 #28568854 未加载
评论 #28567145 未加载
jpzkover 3 years ago
Check <a href="https:&#x2F;&#x2F;handshake.org&#x2F;" rel="nofollow">https:&#x2F;&#x2F;handshake.org&#x2F;</a> it has the potential to overthrow DNS and CA while also providing real ownership to names.
评论 #28566577 未加载
评论 #28566356 未加载
评论 #28566003 未加载
评论 #28568457 未加载
评论 #28567009 未加载
评论 #28566980 未加载
mrfusionover 3 years ago
Whatever happened with namecoin?
sjatkinsover 3 years ago
DNS is getting rather long in the tooth and I expect it will be replaced largely RSN. Article assumes we will keep internet address assignment the same as well and not at least move to IPV6 and a less stingy model of effectively static addresses. And the use of VPN today and something rather different tomorrow will likely change this. What happens when you effectively throw an authenticated request into some pool&#x2F;queue of outstanding request and something else pools it and forwards it then putting response in pool? The assumed direct link of packet IP address to website that is fixed is not likely to last so long imho. Already we are starting to see blockchain mediated DNS like services. I would not be surprised by some kind of NFT registration of sites.
评论 #28571669 未加载
评论 #28570816 未加载