-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
# Carsten Agger agger@modspil.dk [ 16. Jan 2014 @ 16:11 +0100]:
If you can change your router (ideally to one running only free software, using protocols specified by the ISP), you can protect yourself in the case where you trust your ISP, but not the router it supplies you.
In that scenario, if you don't trust your ISP all is lost unless you use VPN or Tor.
How to trust your ISP would be the "next problem" after getting rid of compulsory routers, I suppose.
Yes, you're completely right. After the NSA leaks, the usage of Tor/VPN increased heavily and people started to secure their online privacy and security in different ways. But paradoxically less people care about their basic network security. One can also use plain HTTP instead of sophisticated anonymisation techniques if his "inner circle" is compromised. The leaks before the end of 2013 stated that NSA successfully redirected network traffic to shadow servers with cloned content if the hardware is backdoored/insecure. So if your router isn't secure, your traffic is neither, no matter which tools you use - Man-in-the-middle says hello.
I really hope the importance of this topic will be stressed in the upcoming months in some other IT magazines and on conferences.
Best, Max
- -- Max Mehl - Free Software Foundation Europe (FSFE) - fsfe.org Schönhauser Allee 6/7, 10119, Berlin | Phone: +49-30-27595290 About me: http://fsfe.org/about/mehl | Blog: blog.max-mehl.com Support us: http://fsfe.org/support | Homepage: max-mehl.com