How Network Communication Works

You’re probably already aware that cell phones don’t communicate directly with other cell phones, they communicate with cell towers who mesh with other cell towers to relay your call, text, or other data from tower to tower until it reaches its destination. But you may not know that the internet works in a similar fashion. In this section, I want to explain how modern digital communication works to help you understand how some of the tools and techniques in later sections protect your communications.

Your Phone is a Radio

Without getting too deep into the weeds, all wireless signals run on the electromagnetic spectrum. Remember ROYGBIV from school, aka the rainbow? This is electromagnetic radiation, the kind we know as “visible light.” Believe it or not, wireless signals also run on this same phenomenon, just in a different part of the spectrum. Radio, X-Ray, cell phones, wifi, they’re all just light waves carrying information around. Wireless microphones, radios, cell phones, and even WiFi all falls under the “radio waves” section.

graph of the electro-magnetic spectrum

The Internet Works the Same Way

Whether it’s WiFi or a physical ethernet cable, the internet communicates mostly the same way as cell phones in the sense that your data jumps around from location to location before reaching its final destination rather than going straight to the destination. Once your data leaves your router, it basically jumps through a series of other routers to get to its destination. These routers are not owned by individuals, they’re owned by corporations and internet service providers (ISPs), but the principle is the same.

What is DNS?

Domain Name Service - or DNS - is the address book of the internet. When you type "ProtonMail.com" into your browser, your computer doesn't understand that address. It contacts a specified DNS, which looks up that address and tells your computer "oh, that's 185.70.42.31," (which is what's known as an "IP address"), which your computer understands. Your computer contacts that address, and ProtonMail's website is displayed in your browser. This same basic process happens with apps, streaming services, and pretty much anything requiring an internet connection. For a great explanation of why this matters and is worth protecting, check out Mullvad VPN's "blog post "All about DNS servers and privacy." Many Internet Service Providers and VPN providers operate their own DNS resolvers. If you plan to use a reputable VPN, I highly encourage you to use their DNS resolver to avoid leakage. If you choose not to use a VPN, you can change most devices or browsers to use alternate DNS resolvers. There are a lot of advantages to this. For one, most default DNS providers keep a log of the sites you attempt to accecss, which then gets sold to data brokers and added to your profile. For another, many alternate DNS providers block known advertising domains or malware, meaning a safer and less frustrating experience online. Privacy Guides offers a great list of alternate DNS providers, and if you're unsure how to change your DNS, try doing a web search for the device or browser you're using along with "change DNS."

The basic principle to take away from this section is that no communication goes straight to its destination. Whether it's text, phone call, email, streaming, searches, etc. All communications bounce from place to place, sometimes trading hands of companies and jurisdictions multiple times along the way. Your email to your friend across town might actually cross continents before arriving, and your text message to your friend in the store next door might bounce through several cell phone providers’ networks before reaching them. This kind of relaying ability has made data access ubiquitous and fast in most areas of the developed world, but it also opens you up to incredible risk in terms of protecting your data in transit: you risk having your data unknowingly read or copied or even altered by any number of organizations, companies, criminals, or other people who have access to it along it’s path, whether legitimate or not.