Unencrypted SNI Privacy
The cluster discusses the privacy leak from unencrypted Server Name Indication (SNI) in TLS handshakes, allowing ISPs and observers to identify destination domains despite HTTPS encryption. Commenters debate solutions like Encrypted SNI (eSNI), TLS 1.3 features, and their limited deployment.
Activity Over Time
Top Contributors
Keywords
Sample Comments
Would encrypted SNI fix this?[1] https://blog.cloudflare.com/encrypted-sni/
SNI is getting encrypted soon too
... except that SNI isn't encrypted.
just from reading the docs there is no indication about SNI.
It won't help alone without encrypted SNI.
eSNI is going to fix thathttps://tools.ietf.org/html/draft-ietf-tls-esni-07
Also don't forget about SNI. This exposes the domain you're connecting to over TLS. Yes, I know eSNI is a thing, but it's new and so unlikely to be deployed much.
That can't be it, SNI certs had been supported for a long time already
SNI (Server Name Indication) leak is still present and your ISP may know what website you're asking.
Couldn’t your isp watch traffic to pull out SNI information?