If you rent a VPS and run a VPN server on it (including DNS through the tunnel), then your ISP can’t see anything except an encrypted stream of info between your house and the server.
But your VPS cloud provider can see any traffic between your server and the internet.
That said, given most all site are using HTTPS, the only things these people can see are which sites you’re connecting to and for how long. They cannot see what information is being passed inside the connection.
If you want to get paranoid about it and don’t mind a substantial speed hit, you can use Tor (or even a VPN + Tor). The gov could still track you if they’re really trying, but it will effectively hide your traffic from your ISP or Cloud provider.
If you buy a server and make it a VPN, then your ISP cannot see what you are doing. If the server is a virtual private server (AWS, GCP, etc) then the provider can look at your server, but is not inclined to do so unless compelled by law enforcement.
Any carrier can track traffic passing through them even the ISP’s that provides the uplink to your ISP. Though it doesn’t pay for larger carriers who exclusively provides Internet to ISP’s as they don’t handle individual residences. This same goes for the VPS provider. That being said, most of the time depending on advanced the provider is, it probably doesn’t pay to track the data because it’s just simply not worth it.
The reason why your ISP knows you are using a VPN provider is that the Provider’s IP’s are known to be a VPN. ISP’s tend to block those for various reasons on the last mile equipment.
What you want to shoot for is to find a smallish data center that’s been run by a few people for years that provides VM’s with public IP’s. Setup a VPN server there and use that as your VPN. The good ones have their own “ASN” and have multiple provider uplinks. Those smaller DC’s are wonderful to work with most of the time because they tend not to be owned by private equity groups or wall street. You could potentially score a deal with them too.
What will happen then when you VPN in, is to your ISP, it looks like you are VPNing to work and you are working from home. At that point, even the big Comcast, Cox, Spectrum and others will see that as it’s no touchy. VPN not working? Complain to your ISP that you work from home and ask why is the work VPN being blocked. Last thing these companies want is to get sued by businesses with plenty of legal resources.
Your ISP will see you are connected to a VPN. They’ll also see your activity, but not exactly what you are downloading/torrenting, but they’ll see file sizes, but still cannot interfere with you whatsoever because torrenting is completely legal and allowed.
The VPN’s purpose is to hide what it is you are downloading, and who is downloading/torrenting the content, in the event someone tries to identify you, they will not be able to.
If you use a vpn, your VPN provider can see what you’re doing.
You can severely limit what your VPN can see. Sign up without giving ID (all they care is that your payment works, pay cash or gift card or something), and use HTTPS. Then about all your VPN knows is “someone at IP address N is accessing sites A, B, C”.
In this case the VPS provider can see what you’re doing, so it doesn’t achieve what I want.
Yes, I know that can’t see more than the metadata, and that probably no one is looking at it. It’s just the thought that they could look at it if they wanted to that bothers me.
TOR is good, but it is slow like you said. I’m not doing anything illegal so it’s not practical. I was hoping there’d be a way to achieve a good level of privacy on the clearweb too
Yes, they probably do bother what you’re doing, using automated systems to categorize what users spend time doing on the internet and selling this info, this wouldn’t cost much effort
Yes, I know that can’t see more than the metadata, and that probably no one is looking at it. It’s just the thought that they could look at it if they wanted to that bothers me.
At some point between you and the website, someone has to see at least the HTTPS traffic, DNS traffic, etc. Otherwise there is no way to route the traffic from the VPS to the destination