Skip to main content

Short answer : you cant'tcan't prevent them from sniffing your traffic, but you can make it mleaninglessmeaningless for them by using encryption.

Either use encrypted protocols (HTTPS, SSH, SMTP/TLS, POP/TLS, etc.) or use encrypted tunnels to encapsulate your unencrypted protocols.

For example, if you use HTTPS instead of HTTP, the content of the webpages you fetch will not be readable from those routers.

But remember that they can still save the encrypted packets and try to decrypt them. Decryption is never about "can or can't", it's about "How much time does it takes"take". So use ciphers and key lengthlengths suitable for the degree of privacy you need, and the "expiration time" of the data you want to "hide". (meaning if you don't care if someone getgets it a week after the transmission, use a strong protocol. ifIf it's an hour, you can lower the key length)

Short answer : you cant't prevent them from sniffing your traffic, but you can make it mleaningless for them by using encryption.

Either use encrypted protocols (HTTPS, SSH, SMTP/TLS, POP/TLS, etc.) or use encrypted tunnels to encapsulate your unencrypted protocols.

For example, if you use HTTPS instead of HTTP, the content of the webpages you fetch will not be readable from those routers.

But remember that they can still save the encrypted packets and try to decrypt them. Decryption is never about "can or can't", it's about "How much time does it takes". So use ciphers and key length suitable for the degree of privacy you need, and the "expiration time" of the data you want to "hide". (meaning if you don't care if someone get it a week after the transmission, use a strong protocol. if it's an hour, you can lower the key length)

Short answer : you can't prevent them from sniffing your traffic, but you can make it meaningless for them by using encryption.

Either use encrypted protocols (HTTPS, SSH, SMTP/TLS, POP/TLS, etc.) or use encrypted tunnels to encapsulate your unencrypted protocols.

For example, if you use HTTPS instead of HTTP, the content of the webpages you fetch will not be readable from those routers.

But remember that they can still save the encrypted packets and try to decrypt them. Decryption is never about "can or can't", it's about "How much time does it take". So use ciphers and key lengths suitable for the degree of privacy you need, and the "expiration time" of the data you want to "hide". (meaning if you don't care if someone gets it a week after the transmission, use a strong protocol. If it's an hour, you can lower the key length)

Source Link
mveroone
  • 1.9k
  • 1
  • 16
  • 27

Short answer : you cant't prevent them from sniffing your traffic, but you can make it mleaningless for them by using encryption.

Either use encrypted protocols (HTTPS, SSH, SMTP/TLS, POP/TLS, etc.) or use encrypted tunnels to encapsulate your unencrypted protocols.

For example, if you use HTTPS instead of HTTP, the content of the webpages you fetch will not be readable from those routers.

But remember that they can still save the encrypted packets and try to decrypt them. Decryption is never about "can or can't", it's about "How much time does it takes". So use ciphers and key length suitable for the degree of privacy you need, and the "expiration time" of the data you want to "hide". (meaning if you don't care if someone get it a week after the transmission, use a strong protocol. if it's an hour, you can lower the key length)