Answer the question
In order to leave comments, you need to log in
The provider will resolve google.com to its own IP, while HTTPS continues to work. It's safe?
The local provider will resolve google.com, youtube.com and, possibly, some other addresses IP address from its own range, namely 85.114.182.207, 85.114.182.211 and others from this range (provider: aist.net.ru, Tolyatti ). For reference, the DNS servers are 81.28.160.1 and 82.28.160.111, but they are most likely only accessible from the internal network.
For youtube.com, the provider's DNS gave out the address 81.28.161.2, and the reverse nslookup 81.28.161.2 gave this:
$ nslookup 81.28.161.2
Server: 127.0.1.1
Address: 127.0.1.1#53
Non-authoritative answer:
2.161.28.81.in-addr.arpa name = blocked-sites.aist.net.ru.
...
Answer the question
In order to leave comments, you need to log in
https://www.pgpru.com/forum/prakticheskajabezopasn...
you can not bathe,
but if paranoia - VPN
and all such wildly sat down on treason. bad for yourself. the provider received at its disposal a certificate from Google and YouTube. and what kind of provider, if not a secret?
and how (in your opinion) will help you change the dns server in the case of certificates?
The provider can intercept traffic without redirecting it to its hosts, i.e. it is no more dangerous than any other way to intercept traffic. The only difference is that you know for sure that traffic is being intercepted and listened to. If HTTPS is not violated and you do not have trusted certificates of this provider installed, then this should not lead to the possibility of decrypting https traffic by the provider.
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question