Stop! Don’t Let ISPs Sell Your Data – Here’s How to Block It

Tor Cons:

  • Super Slow Speeds:
    Because data is reflected in multiple countries, streaming or downloading is almost impossible.
  • No Other App Support:
    Only protects activity in the Tor browser, not apps like Spotify or WhatsApp.
  • Frequently Blocked:
    Some countries sometimes block access to the Tor network.

3. Change ISP Default DNS

ISP DNS Dangers:

  • Every time you visit a website (e.g., google.com), ISPs translate the domain name to their IP address via their DNS.
  • This means that your ISP knows all the sites you visit, even if you’re using HTTPS!

How to Set Up Alternate DNS:

A. On your phone (Android/iOS):

  1. Go to Wi-Fi > Settings.
  2. Long-press the Wi-Fi network > Modify Network.
  3. Select Manual DNS, enter:
    • Google DNS: 8.8.8.8 and 8.8.4.4
    • Cloudflare DNS: 1.1.1.1 and 1.0.0.1

B. On PC (Windows):

  1. Open Control Panel > Network and Sharing Center.
  2. Click Change adapter settings > select an active connection.
  3. Properties > IPv4 > enter your preferred DNS.

– Use DNS-over-HTTPS (DoH) in your browser (Firefox/Chrome) for extra encryption.
– DNS leak test at https://dnsleaktest.com.

4. Only Visit HTTPS Sites – Protect Data from ISPs

HTTP (Not Secure):

  • Data is sent raw, readable by ISPs, hackers, or third parties
  • The ISP looks at the entire activity (form input, login history, etc.)
  • Example: http://situsbank.com/login (high risk!)

HTTPS (Locked):

  • Using SSL/TLS encryption
  • ISPs only know the domain name (example: tokopedia.com), and can’t see specific pages or content
  • Marked with a padlock 🔒 in the address bar

5. Take Advantage of Proxies – A Simple But Risky Option

When Are Proxies Useful?

  • Bypass of light blocking (e.g., sites blocked at school/work)
  • Hide real IP quickly (but not as secure as a VPN)
  • Access georestricted content (example: YouTube videos that are only available in the US)

Key Risks of Proxies:

  1. No encryption. Traffic remains readable ISP/hacker if the proxy does not use SSL
  2. Proxy owners can steal data. Many free proxies keep logs and sell user data
  3. Malware & Ad Inject. Untrusted proxies often insert malicious pop-ups

Proxy Recommendations (if forced):

  • Paid Proxies: Luminati, Smartproxy
  • Free (Be careful): Hide.me, ProxySite

Latest Articles