>>13090
https://www.eff.org/pages/tor-and-https
I am not an expert, but I think I know my shit.
Assuming you are using HTTPS version of this site, they can very easily know you are surfing this site, but actual data is encrypted. Your posts will go through the network encrypted. ISP won't have any idea about the boards or the threads you are visiting. But they will know you are using this site, as they will have to know this site address in order to send your requests here. This is mainly because if you are not using VPN, you are most like using the DNS resolver provided by your ISP, which basically converts human readable web addresses like lukesmith.xyz into IP addresses which are then used to send and receive packet from a site. But if you use other secure DNS resolvers, all your ISP sees is the IP you are connecting to as your custom DNS resolvers eg cloudflare has already converted lukesmith.xyz to IP address. But many time they can figure out from IP address that you are connecting to what site.
VPNs are good shit for these things, but TOR is based. If you use VPN, all you traffic will first go through VPN's server, and if you use HTTPS sites, then they will have no idea what you are sending or receiving, or to whom you are sending your requests. So, basically if you surf r*ddit, or yt or 8chan over HTTPS protocol, it will be nearly indistinguishable to them ie you ISP.
tldr; HTTP sites, they know what specific web addresses you are visiting.
HTTPS sites, they only know which website you are visiting.
HTTPS with VPN with non-ISP DNS, they almost have no clue.
VPN recommedation, ProtonVPN. I am not endorsing it, it is what I use. It offers free service and 7 day free trial. It's FOSS, and has no logging policy.
You can setup custom DNS resolvers for android and for specific browsers.
Post too long. Click here to view the full text.