• undefined@links.hackliberty.org
      link
      fedilink
      English
      arrow-up
      6
      arrow-down
      1
      ·
      13 hours ago

      Maybe from a security perspective but in terms of privacy, no. SNI can still be read, and just because DNS isn’t plaintext doesn’t mean it’s not possible to see which servers you’re talking to. And like others have said, there’s still a lot happening in plaintext at the OS and/or application level.

      • deadcade@lemmy.deadca.de
        link
        fedilink
        English
        arrow-up
        1
        ·
        9 hours ago

        Still doesn’t make a VPN the “magic all in one solution” it claims to be. And SNI is encrypted on newer servers using encrypted client hello (ECH).

        In terms of privacy, you’re switching around which entity gets to see a ton of details. Do you trust random public wifi enough, given modern security standards? Or do you trust a VPN company more, despite false advertising?

        Use HTTPS and DoH (Becoming a default on some Android versions), and the average person will be just fine without a VPN.

        • undefined@links.hackliberty.org
          link
          fedilink
          English
          arrow-up
          1
          ·
          edit-2
          8 minutes ago

          That doesn’t really solve the issue of others near the public network being able to sniff out which IP addresses you’re connecting to. In fact, they could deny service to your DoH provider and force DoH not work (if they did the same to the VPN endpoint hopefully your VPN has a kill switch).

          As for shifting the entity that sees your network traffic, that’s true and you definitely have to trust the VPN provider (and whatever company their traffic is passing through).