What is the ISP Log retention timeline?

So I have this particular question, how do ISP store Ip logs in timeline terms?

Suppose an ISP stores logs for 6 months.

Do they store the january-december (Yearly) logs for 6 months,

Or do they rotate so each month is only stored 6 months.

Example: January logs is stored for 6 months, and then gets rotated, then February log gets stored for 6 months and then gets rotated, and so on.

I hope to hear from you guys
Best Regards

How does TLS stop an ISP from spying on you

Here is what I understand about how clients trust the tcp channels they are connected to.

  1. Alice asks Bob for his certificate, signed by a CA’s private key
  2. Bob sends the certificate, which includes his common name (domain or ip) and an attached signed version of it.
  3. Alice uses her local public key from the CA to decrypt the signed version and compares it to the certificate to verify Bob’s claims.
  4. If it checks out, if it’s equal, the tcp layer she is connected to does indeed have Bob at the other end.
  5. Now that the connection has been verified, both can agree on keys to encrypt their communications.

But couldn’t an ISP easily intercept and alter all communications to Bob through a proxy setup just for him inside a network switch? Including sending and receiving the certificate to Alice? Bob’s communications already go through network switches, that’s where his IP actually lives. An ISP could just inject software right in there to do whatever, as if it was Bob, and no one would know.

Furthermore, the whole process can be compromised at every stage, from the moment Bob sends a CSR to a CA.

Man in the middle – Can the ISP (or someone who is spying on my WIFI network) see which VPN IP I am connecting to?

In short, the ISP can see everything outside the tunnel and nothing inside. The IP headers communicate the destination, i. H. The other endpoint of the tunnel, and TCP or UDP headers can display the protocol with a standard port.

On a single VPN server, the IP address at the other end of the tunnel is usually the same one used for the connections that leave the server. With commercial VPN providers, you may even be able to "switch locations", which technically means that your traffic is through a different IP address, i.e. H. Internally forwarded in their systems. More importantly, it is mixed with other customers' traffic, which increases anonymity.

All of Network layer L3 and higher run through all routers between source and destination. That means the IP addresses, port numbers and unencrypted Application layer Protocols etc. are seen by every router in between. The MAC address is part of a Data transmission level L2 protocol and is only seen by the next node. With VPN there is a new set of L3 + stacks that are encrypted in the tunnel.

Protocols – Can an ISP block BitTorrent peer detection but not file transfer?

When I start new torrents, I notice that there is no traffic for hours. I switch to another network (a cellular hotspot) and the torrents begin to flow. I return to my usual network and the torrents continue.

I have tried this several times.

What could explain that? Is the ISP able to block BitTorrent peer detection but not file transfer? How can an ISP generally block BitTorrent?

Privacy Policy – What IMEI (s) does an ISP get when I use a mobile hotspot to connect my laptop to the Internet?

I found out today that ISPs get the IMEI code of every connected device
They.

You can find a (very old) reference here: http://news.bbc.co.uk/2/hi/technology/4738219.stm

So I asked myself: In the event that I connect to the Internet using a mobile phone
Hotspot with a prepaid SIM card, which IMEI (s) does the ISP receive?

Assume the setup is: laptop – mobile phone – internet

Does the ISP only get the cell phone IMEI, the laptop IMEI or both?

Data Protection – Do Carrier Servers Allow the ISP to See Everything I Do in a VPN?

AFAIK: If the connection to the VPN server is set up correctly, the ISP cannot see any traffic.

Still, I just found a worrying comment on this blog post:

https://www.stealth-phones-guide.com/blog/anonymous-sim-card-scam

I just wanted to ask the experts on this website again: Is it true what the guy says in his comment?

This means that if I can forward all of my data traffic with a prepaid SIM card via a mobile hotspot with a VPN on both devices (e.g. a laptop and the cell phone that acts as a hotspot), the ISP can do anything but a connection recognize get into the VPN?

The answer to that question would have been a resounding NO, but this guy who added the details of a "carrier server" and a prepaid SIM card made me doubtful as he seems to know more than I do.

ISP Offers Cloud Hosting in Telehouse North to LINX * and * Peer Members with Nominet?

I am looking for cloud hosting in Telehouse North – dedicated IP, low bandwidth, medium cores / SSD – please send me your website and the cost.

As a background – more than 12 years ago there were some posts in the forum – I'm looking for the lowest latency connection to Nominets dac.nic.uk – is this possible with a cloud server or is a dedicated server required?

Thanks a lot

lion