Reasons to be paranoid about the internet


OSI model implementation

Computer networks are organized in different layers with each layer performing a different function. These layers are best described in the OSI-model (see wikipedia: https://en.wikipedia.org/wiki/OSI_model#Layer_architecture) The function of each layer is performed by a protocol. To have a network stack that is easy to understand it is best that each protocol is constraint to a specific task limited to a layer of the OSI-model. The core protocols of the internet, as introduced by DARPA with ARPA-net, are TCP and IP. IP performs its function within the Network layer of the OSI model. TCP however covers 2 different layers of the OSI-model, namely the Transport Layer and the Session layer.

HTTPS

Compared to HTTP most people think that this is just the same only that it encrypts what is being sent. There are more differences. A key one is that HTTP works over the TCP protocol whereas HTTPS completely skips the TCP protocol in favor of the UDP protocol. The difference between TCP and UDP is that TCP checks for complete delivery of the packet being sent, whereas UDP does not. So with HTTPS the server that sends the data does not check if it has been correctly received by your browser. This could make it easier for someone, somewhere in the middle change the data that is being sent (Man in the Middle attack)

CORS

Cross Origin Resource Sharing (CORS) is what makes it possible nowadays for a web page to load information from different URL's. Initially this was not allowed on the internet and when you load a page it could only contain information bits that came from the same url or IP-address. Some found this to too limiting so they invented CORS to define some rules built in the browser on what could be loaded from other URL's within the same web page. Today however CORS has been watered down to basically allow anthing to be loaded within a web page. This is dangerous for many reasons, but important to point out here is there is no longer a way to know for sure that the information you see visualized on a web page is fully coming from the URL in the address-bar of your browser.

IPv6

Do you remember the craze that started in the early days of the internet where people were warning that the internet was going to run out of IP-addresses, this supposedly being a limitation of IPv4 and therefore a new versions seemed justified: IPv6. Back then it seemed obvious that IPv4 would be abondoned once IPv6 was fully rolled out so no one would run out of IP-addresses. IPv4 allows 4 billion public IP addresses. During that craze it seemed like every human on the planet was going to need his or her own IP address, but this is wrong. The IP-address you get from your ISP is always a private and multiple ISP's can use the same range of private IP-addresses. So the supposed shortage of IP addresses only really conserns servers on the internet.

BigTech's extranets largely replace the internet

The Big Tech companies like Google, Apple, Meta, Microsoft, have also been getting paranoid about the internet for many years. So as creative as they are they decided to do something about it. They actually built out their own internal companynetwork's the the front-door of nearly every ISP in nearly all countries. With the exception of Apple all these Big tech companies own 10 to 20 cross-ocean fiber cables. This has not only been to interconnect their own regional data centers but they also use this to expand their connection to the public internet to multiple points where possible directly to to the local internet back bone provider or even directly to a local ISP. In effect for all traffic going from your computers or devices to say Google, if your ISP connects directly to Google's extranet, you completely bypass the public internet alltogether. This in itself is not necesarrily a problem, but if you start to think about what I explained above about CORS, Google's servers are not just called when you type a url that ends on ...google.com, they are also called by cookies and trackers from just about every other web site you visit. This potentially gives companies like Google the power as explained to rewrite (e.g. with java-scripting) any web site that includes a call to Google.

5G and net-neutrality

It shouldn't always be me explaining, so here is what GrokAI writes in it's conclusion: 5G does not inherently violate net neutrality, but its network slicing feature enables ISPs to prioritize certain traffic, creating fast lanes that can conflict with the principle of equal treatment. Commercial incentives, regulatory ambiguities, and the potential to widen digital divides exacerbate these concerns. While some argue that 5G’s capacity and efficiency could neutralize neutrality issues, critics highlight that finite bandwidth and ISP practices (e.g., throttling, paid prioritization) undermine this optimism. Without clear regulations, 5G’s capabilities risk creating a tiered internet, contrary to net neutrality’s goals.
5G network slicing can target individual users for both throttling and blocking by leveraging user-specific policies, DPI, and dynamic slice management. This is enabled by 5G’s granular control mechanisms (e.g., NSSF, UPF, PCF) and poses a significant threat to net neutrality by allowing ISPs to discriminate against specific users based on subscriptions, behavior, or commercial interests. Regulatory gaps, especially in the U.S. post-2025, exacerbate the risk of abuse, while commercial incentives drive ISPs to prioritize premium users or services

In my words: where there was previous never a network standard that included the possibility to split up traffic in fast and slow lanes, this is now possible with 5G. This goes against the principle of net-neutrality on the internet where your ISP does not decide, nor anyonwe else, which of your internet traffic goes fast and which slow. This not only can be used by the ISP to decide what's fast or slow, governments or other stake holders may want a say. Quickly this turns into a political debate with concerns about censurship, free speech and then the question arrises: We need rules on how to make the rather politially sensitive decision on how to use this feature of 5G. If you ask me this was a dum idea to add this feature to 5G. It goes against the principles and values of of the free internet and if someone actually decides to use this slicing feature of 5G and launch a political debate because of it it could even slow down the implemntation of 5G. But hold on, off course no one will want to use this in the beginning because of possible politice. But what if where 5 years in the future and 5G is old, 4G, 3G do no longer exist and at 6G is a newer version of 5G with the same slicing feature. What if someone really comes up with a single rule that all ISP's need to implement? Why? Who? 5G is defined by the 3GPP consortium of vendors, telcos, ... Some of the main advocats of slicing were American telco's AT&T and Verizon who gave as reason that they want to give fast access to premium customers. This is a false arguments. The previous standard 4G already allows speeds of up to 3Gbps, that is faster then a standard 1Gbps Ethernet cable that plugs into your computer. Why do we need internet on our phones to be faster then on our computers? Will we soon have 8K video on a 7inch phone display. Maybe there's a future where we will want to watch our phones under a microscope so we get to see how many pixels we otherwise really could never ever see with human eyes (joking).

Please care about net-neutrality, it's about your rights, your freedoms. Don't be indifferent, this really matters. We only get to have our rights and freedoms as long as we keep reminding ourselves that many who came before had to fight to get them and that the day might come where we, yes we, might have to fight again to defend the freedoms and rights we before a silent, indiferent majority lets it all be taken away.

More topics to get paranoid about

Let me know if you find this interesting and if you would like me to further detail the list of reasons to get more paranoid about the internet:

List of internet hacking vulneratbilities placed on OSI-model

The diagram below lists for the internet protocol stack what are well known vulnerabilities and ways of hacking the internet for each layer of the OSI-model. I'm not an expert in hacking, but this gives a good view on how vulnerable the internet really is at every level. Why is so little being done to fix these security vulnerabilities I keep on asking?

This article was originally published on August 23rd 2025 on my site here: https://splendid-treacle-0df202.netlify.app/article_reasons_to_be_paranoid_about_the_internet