{"id":7650,"date":"2026-04-22T18:31:29","date_gmt":"2026-04-22T16:31:29","guid":{"rendered":"https:\/\/yoota.it\/en\/what-your-isp-actually-sees-when-you-use-encrypted-dns-alone\/"},"modified":"2026-04-22T18:31:30","modified_gmt":"2026-04-22T16:31:30","slug":"what-your-isp-actually-sees-when-you-use-encrypted-dns-alone","status":"publish","type":"post","link":"https:\/\/yoota.it\/en\/what-your-isp-actually-sees-when-you-use-encrypted-dns-alone\/","title":{"rendered":"What Your ISP Actually Sees When You Use Encrypted DNS Alone"},"content":{"rendered":"\n<p>The idea that using DNS over HTTPS or DNS over TLS makes you invisible to your ISP has circulated for years. It&#8217;s a flawed oversimplification, and David Bombal, a networking and security-focused YouTuber, decided to dismantle it with a practical demonstration: real traffic, a physical tap on Ethernet, and Wireshark open.<\/p>\n\n\n\n<p>The video, published April 17th, runs about thirty minutes and is worth watching if you have the time. It&#8217;s only on YouTube, which I won&#8217;t embed here, so here&#8217;s the link: <a target=\"_blank\" href=\"https:\/\/www.youtube.com\/watch?v=46hy3r_1VqY\" rel=\"noopener\">https:\/\/www.youtube.com\/watch?v=46hy3r_1VqY<\/a> so you can open it wherever you prefer.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Problem: SNI in the ClientHello<\/h2>\n\n\n\n<p>Encrypting DNS queries hides requests to the resolver, but it&#8217;s not enough to hide the domain name you&#8217;re reaching. When your browser starts an HTTPS connection, during the TLS handshake it sends the <code>ClientHello<\/code> message, which normally contains the SNI field, <code>Server Name Indication<\/code>, readable by anyone observing the traffic. It tells the server which domain you want to reach, because many different sites can coexist on the same IP address.<\/p>\n\n\n\n<p>Bombal demonstrates it live: even with DNS encryption via Google or Cloudflare, and even with TLS 1.3, visited domains can still appear in plain text in the traffic if the site doesn&#8217;t use additional protections. Microsoft, Cisco, Nvidia, ChatGPT: all visible.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">ECH: A Partial Solution<\/h2>\n\n\n\n<p><code>Encrypted Client Hello<\/code> attempts to close this exact gap by encrypting that part of the handshake as well. In Bombal&#8217;s packet capture, sites that use it correctly expose only <code>cloudflare-ech.com<\/code> instead of the real domain. It&#8217;s an important step forward, but it doesn&#8217;t solve everything: not all sites support it, and even when active, other side-channel clues can remain useful for figuring out where you&#8217;re going, starting with the destination IP address.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Most Practical Solution<\/h2>\n\n\n\n<p>In the final section, Bombal activates  and repeats the captures: domains are no longer visible on the local network, replaced instead by encrypted WireGuard traffic to the VPN server. In practice, it&#8217;s the simplest way to prevent your ISP, corporate networks, or anyone else observing that connection from directly seeing which sites you visit.<\/p>\n\n\n\n<p>The video uses Proton for the demo, but the concept applies to any serious VPN. This doesn&#8217;t make you &#8220;invisible&#8221; in absolute terms though: it simply shifts trust from your Internet provider to your VPN provider, which should be chosen carefully. The key is picking a trustworthy service with a verifiable no-log policy and credible track record. Mullvad is another solid choice here, with a deliberately minimal business model and no accounts tied to user identity. <a target=\"_blank\" href=\"https:\/\/lealternative.net\/vpn-consigliate\/#vpn\" rel=\"noreferrer noopener\">You&#8217;ll find an updated list of legitimate VPNs on Le Alternative<\/a>.<\/p>\n\n\n\n<p>The video is on YouTube and you&#8217;ll find it below. If you have ten minutes, jump straight to the Wireshark packet capture section: seeing your own domains scroll past in plain text is more convincing than any written explanation.<\/p>\n\n\n\n    \n    <div class=\"yoota-fonte\">\n        <a href=\"https:\/\/www.youtube.com\/watch?v=46hy3r_1VqY\" target=\"_blank\" rel=\"nofollow noopener\" class=\"yoota-fonte-hit\">\n            \n            <span class=\"yoota-fonte-icon\" aria-hidden=\"true\">\n                <i class=\"ri-external-link-line\"><\/i>\n            <\/span>\n\n            <span class=\"yoota-fonte-content\">\n                <span class=\"yoota-fonte-label\">SOURCE:\/\/<\/span>\n\n                                    <span class=\"yoota-fonte-link\">\n                        youtube.com                    <\/span>\n                            <\/span>\n\n        <\/a>\n    <\/div>\n    \n    \n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>David Bombal shows with Wireshark what your ISP actually sees without a VPN, even when you use encrypted DNS, and why DNS encryption alone isn&#8217;t enough.<\/p>\n","protected":false},"author":2,"featured_media":7649,"comment_status":"open","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"italian_url":"https:\/\/yoota.it\/cosa-vede-davvero-il-tuo-isp-quando-usi-solo-il-dns-cifrato\/","yoota_meta_description":"","activitypub_content_warning":"","activitypub_content_visibility":"","activitypub_max_image_attachments":4,"activitypub_interaction_policy_quote":"anyone","activitypub_status":"federated","footnotes":""},"categories":[34,63],"tags":[32,287,95],"class_list":["post-7650","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-dns","category-vpn","tag-dns","tag-privacy","tag-vpn"],"_links":{"self":[{"href":"https:\/\/yoota.it\/en\/wp-json\/wp\/v2\/posts\/7650","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/yoota.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/yoota.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/yoota.it\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/yoota.it\/en\/wp-json\/wp\/v2\/comments?post=7650"}],"version-history":[{"count":1,"href":"https:\/\/yoota.it\/en\/wp-json\/wp\/v2\/posts\/7650\/revisions"}],"predecessor-version":[{"id":7652,"href":"https:\/\/yoota.it\/en\/wp-json\/wp\/v2\/posts\/7650\/revisions\/7652"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/yoota.it\/en\/wp-json\/wp\/v2\/media\/7649"}],"wp:attachment":[{"href":"https:\/\/yoota.it\/en\/wp-json\/wp\/v2\/media?parent=7650"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/yoota.it\/en\/wp-json\/wp\/v2\/categories?post=7650"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/yoota.it\/en\/wp-json\/wp\/v2\/tags?post=7650"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}