// THE REBEL BLOG

Thoughts on free software, privacy, and taking back control

2026-03-128 min readPrivacy

Network Privacy 101: Protecting Your Digital Footprint

Every time you connect to the internet, you're leaking information. Your IP address, your DNS queries, your metadata—it's all visible to someone. The question isn't whether you're being watched, but who's watching and what they're doing with that data.

In this guide, we're going deep on network privacy. I'll show you how your phone tracks you, why encryption isn't the silver bullet people think it is, and how to set up a more secure network stack.

Your Phone Is a Tracking Device You Carry Everywhere

Let's start with your phone. That device in your pocket? It's a surveillance tool that happens to make calls. Your mobile carrier—and anyone with access to cell tower data—can track your every move.

Here's how it works. Every time your phone connects to a cell tower, it broadcasts several identifiers:

  • IMEI — Your phone's unique hardware serial number. Permanent. Tied to the device forever.
  • IMSI — Your SIM card identifier. Tied to your carrier account and phone number.
  • TMSI — A "temporary" ID that's supposed to rotate, but implementation varies.
  • MAC address — Used by WiFi and Bluetooth. Modern OSes can randomize this, but not all do.

Your carrier sees your IMSI/IMEI every time you connect. They know your phone number (linked to your IMSI). They can triangulate your position using cell towers. They log every call, every SMS, metadata on who you contacted and when.

Pro Tip: GrapheneOS randomizes MAC addresses per network, has better protection against IMSI catchers (fake cell towers), and doesn't whitelist base stations. If privacy on mobile matters to you, this is the OS to run.

The uncomfortable truth: your identity is tied to your SIM (IMSI) and your device (IMEI). Anyone with access to cell network infrastructure can track you. That's your carrier, law enforcement, and potentially hackers with the right equipment.

What Can You Do?

  • Use GrapheneOS or a hardened mobile OS
  • Turn off your phone when you're not using it
  • Use airplane mode in sensitive situations
  • Consider a Faraday bag (signal-blocking pouch) for truly sensitive scenarios

Encryption Isn't Enough—Here's Why

Here's something that surprises most people: using HTTPS doesn't make you anonymous. I know, I know—your browser shows that little lock icon. You're "secure." But let's unpack what encryption actually protects and what it doesn't.

Important: Encryption protects CONTENT. It does NOT protect METADATA. This distinction matters more than you think.

What encryption hides:

  • The actual content of your HTTPS traffic
  • Form data and passwords
  • File contents

What encryption doesn't hide:

  • Your IP address (visible to every server you connect to)
  • Domain names via SNI (Server Name Indication)—that lock icon doesn't hide which site you're visiting
  • DNS queries (unless you're using encrypted DNS)
  • Metadata: who, when, how much data, how long

Your carrier knows your IMEI/IMSI, which ties to your phone number, which ties to you. They see every IP address you connect to. They can correlate traffic timestamps with your subscriber account. They can hand all of this over with a subpoena—or sell it to advertisers.

Better Privacy Practices

Use a VPN. It hides your traffic from your carrier. Your ISP sees only encrypted gibberish connecting to one IP (the VPN server). Choose one with a verified no-log policy—Mullvad is excellent, accepts cash payment for anonymity, and has been audited.

Use encrypted DNS. Services like NextDNS or Cloudflare 1.1.1.1 encrypt your DNS queries so your ISP can't see every domain you visit.

On GrapheneOS: Enable private DNS and use the built-in connection monitoring to see which apps are making which connections.

The math behind encryption is solid. But metadata can still identify you even if the content is encrypted. This is the uncomfortable truth of network privacy.

ISP vs VPN: Who Should You Trust?

This is a fundamental question of privacy architecture. You're shifting trust either way. Let's be clear about what each party can see.

Your ISP sees:

  • All unencrypted traffic (HTTP, DNS in plaintext)
  • Every domain you visit (DNS queries)
  • Metadata: who, when, how much, how long
  • Your real IP address
  • Your home address (subscriber info)
  • They can sell your data to advertisers
  • They must comply with government surveillance requests

A reputable VPN like Mullvad sees:

  • Only encrypted traffic (can't read it)
  • Connection to their server (not your real IP)
  • No logs by policy (verified by audit)
  • No connection to your identity (anonymous account, no email required)
  • Swedish jurisdiction (strong privacy laws)

You're shifting trust from your ISP to a VPN. But you're shifting to a service specifically designed for privacy, not one whose business model is surveillance and data monetization.

Caveat: A VPN can still see your traffic if they wanted to. Choose one you trust. Government agencies can still compel VPNs to log in their jurisdiction. For maximum anonymity, combine VPN with Tor.

Hotspot Security: Phone vs Laptop

If you're running a Linux laptop and want cellular internet, here's the key insight: use your GrapheneOS phone as the gateway, not the other way around.

Here's why:

  • GrapheneOS is a hardened OS with minimal attack surface
  • Your phone acts as a security gateway between the cellular network and your laptop
  • Linux desktop has more running services, more attack surface
  • Phone sandboxing isolates network traffic better

Keep your laptop off cellular networks entirely. Let your hardened phone handle that exposure. Your laptop connects to your phone via USB—simpler, more secure.

Direct Tethering vs Router: Keep It Simple

I've seen people set up elaborate configurations: phone → router → laptop. Here's the uncomfortable truth: you're adding complexity, not security.

  • USB tethering is more secure than using a router
  • Fewer devices in the chain means smaller attack surface
  • USB is a controlled, wired interface
  • Adding a DD-WRT router adds firmware vulnerabilities you need to manage
  • WiFi exposure—even if your laptop uses ethernet, the router is broadcasting

The phone is already your security gateway. Adding a router between phone and laptop doesn't strengthen that—it extends the attack surface.

Use cases for a router: Multiple devices need internet, you want to isolate other devices from your laptop, or you need better WiFi range. Not for security.

The Bigger Picture

Network privacy isn't about achieving perfection. There's no such thing as perfect security. It's about making yourself a harder target.

Most surveillance is automated. Mass collection systems grab everything they can. If your traffic is encrypted and routed through a VPN, you bounce off those automated systems. A human has to specifically target you to read your messages.

That's the difference between mass surveillance and targeted surveillance. That's the difference between being data and being a person.

Start with one change. Use your phone as a hotspot instead of your laptop. Set up a VPN. Enable encrypted DNS. Every step reduces your attack surface.

The goal isn't perfection. The goal is progress.

// Comments

Leave a Comment