Skip to main content

You are not logged in. Your edit will be placed in a queue until it is peer reviewed.

We welcome edits that make the post easier to understand and more valuable for readers. Because community members review edits, please try to make the post substantially better than how you found it, for example, by fixing grammar or adding additional resources and hyperlinks.

Required fields*

12
  • 10
    ...if they control the ISP, they can read everything, and modify anything you attempt to access, DNS or otherwise. SSL only helps if you downloaded the root certificates over an "independent" channel - in a tech-savvy totalitarian regime, you have a bootstrapping problem (your only channel is opponent controlled). Commented Aug 14, 2018 at 6:59
  • The problem you face is a called "DNS Leak", which mostly due to mislook DNS request that bypass VPN. Another common DNS leak misconfiguration is overlooking IPv6 DNS request. Commented Aug 14, 2018 at 7:17
  • 6
    say you add youtube's ip adresses to your hosts.conf 208.65.153.238, 208.65.153.251, 208.65.153.253, 208.117.236.69 and try to access youtube. does that work or will the request to the ip adress also be blocked by your isp? because if that is blocked then as well a fix for the dns won't help you either. Also, without a vpn your ISP will know what you're requesting and might pass that info on to the authorities. Commented Aug 14, 2018 at 9:18
  • 5
    DNScrypt may be helpful in your situation. Commented Aug 14, 2018 at 10:33
  • you can test for MITM by comparing the difference in latency between a "ping" to a given server and a DNS lookup (e.g. with dig). If the DNS lookup response is returned much faster than a ping is you can be reasonably sure that there's a more local interception going on. Commented Aug 15, 2018 at 13:26