When there were ISP-owned routers, I just set a private router on the inside. As long as their box does their job, mine did work for me.
Selfhosted
A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.
Rules:
-
Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.
-
No spam posting.
-
Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.
-
Don't duplicate the full text of your blog or github here. Just post the link for folks to click.
-
Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).
-
No trolling.
-
No low-effort posts. This is subjective and will largely be determined by the community member reports.
Resources:
- selfh.st Newsletter and index of selfhosted software and apps
- awesome-selfhosted software
- awesome-sysadmin resources
- Self-Hosted Podcast from Jupiter Broadcasting
Any issues on the community? Report it using the report flag.
Questions? DM the mods!
A router provided by an ISP is not your hardware, thus any network behind it is by definition not controlled by you. There have been numerous cases where they have backdoors or known admin passwords. In cases where there is a wire type transition (for example incoming over coax or fiber) it might be necessary to use it though. Same if it is necessary due to your contract.
In my cases I always turn off the wireless antennas and switch it to bridge mode, then place my own router/firewall device behind it.
Edit: still learning to spell.
As I’ve grown older, I’ve realized that I care a lot less about whether I own the device or the ISP. I’ll happily root the fucking thing. What are they going to do, send me to a competitor? I have 3 different networks I can connect from at any moment (including hotspots), so I’m not worried about a minor lapse due to ISP temper tantrums.
I will tell them casually too. I don’t want their support. I pay for internet access, it’s their problem if they try to make my access conditional beyond that.
We all go our own ways. Over the later years I’ve added features and with it the inevitable complexity. Self-hosting my own data has made my care more about what goes on in my network. I am not quite at the stage of adding VLAN’s but it will probably come.
Your router is an important security device that you should own and control your self if you want any semblence of ownership over your network.
Your modem is remotely controlled by the ISP even if you own it, and is mostly there to demodulate from the medium installed by your ISP (usually cable, or fiber but those are called ont's not modems) to a standard cat. 6 Ethernet connection you can plug into most routers.
The main benefit of owning your own modem is not having one with a router built in and not having to pay an equipment fee.
ISP can see your traffic anyways regardless if their router is at your end or not. In here any kind of 'user behavior monitoring' or whatever they call it is illegal, but the routers ISPs generally give out are as cheap as you can get so they are generally not too reliable and they tend to have pretty limited features.
Also, depending on ISP, they might roll out updates on your device which may or may not reset the configuration. That's usually (at least around here) made with ISPs account on the router and if you disable/remove that their automation can't access your router anymore.
So, as a rule of thumb, your own router is likely better for any kind of self hosting or other tinkering, but there's exceptions too.
This is the sensible comment.
The ISP wouldn't see your self hosted traffic. Not to mention many people don't encrypt it if it's on their own local network. And ISP tracking is becoming less successful with QUIC, Encrypted Client Hello, and DNS over HTTPS or DNS over TLS.
ISP obviously don't see the traffic inside your own network, regardless of the router used. But as soon as you open any kind of connection over the internet, incoming or outgoing, your ISP has to have some information about it to route the traffic. DNS over TLS doesn't hide that your browser opens connections to servers, they can see if you use wireguard to access your services (not which ones, just in general that there's traffic coming and going) and even if you use VPN for everything they can still see the encrypted VPN traffic and, at least technically, apply pattern recognitions on that to figure out what you're doing. And if you use VPN then your VPN provider can do the same than your last-mile internet provider, so you'll just move the goal by doing that.
Last-mile ISP is going to be a middleman on your network usage no matter what you use and they'll always have at least some information about your usage patterns.
Honest answer, why tf would s/o vote this down?
I've often wondered about down votes as well. It's not the points, as I care nothing about that. However, if you're going to down vote something, have the balls to explain why. Maybe the down voter knows something that we all can learn from. It just seems like a common courtesy to do so.
It might just be an error. It's not too hard to hit one by mistake when scrolling on a touch screen device.
Could be. Not ruling that out. It seems to pile up tho on certain comments tho. Makes me wonder. I'm always down to be schooled. Shit son, ring the bell! Ahhh the internet.
However, if you're going to down vote something, have the balls to explain why.
This is why downvoting is fundamentally flawed. It could be "I don't like it" all the way up to "I know for a fact that's wrong," but nobody else will ever know the rationale.
I don't even see downvotes on my instance, and I never want to, because it just raises questions and confusion.
I've always liked the way slashdot handles comment rating. It's a bit complicated, so maybe that's why it's not adopted elsewhere, but it gives a much more fine grained options instead of just up/downvote.
Oh, that's an interesting way to do it. You'd probably have to have a handful of moderators each for the various comms, but it sounds like it would at least resist lazy engagement.
because it just raises questions and confusion.
This. I think, waay back in the day, down voting was a way to filter bad information. Whenever I see a down vote on something I've said, I'm always left wondering if I gave erroneous information, was I out in the weeds smokin' crack? I'm always down for being educated.
Router provided by my ISP is just garbage. The settings are so scrace, I might as well just connect my PC directly (if I could, cause cable is DOCSIS). Had to buy 10yo DOCSIS router that actually is usable.
If your router is fine in settings, maybe changing it won't be necessary. As for ISP spying on you - probably possible but certainly is not likely.
Had to buy 10yo DOCSIS router that actually is usable
Alternatively, you don't have to be restricted to a 10-year-old router just because of DOCSIS.
You could change the router to bridge mode , effectively making it just an external modem for any ethernet-to-ethernet router of your choosing.
The router that comes with my ISP contract is garbo and I highly doubt it has bridge function. With my used 60euro worth fritzbox, I keep the customization options and reliability. It has been 1.5 years and it hasnt failed me a single time while the other constantly had issues with stuff connecting to it.
Regardless of whether your ISP is leveraging their ownership of your router to violate your privacy, they are using it to exploit you financially. Owning your own equipment is always going to save you money compared to what an ISP will charge you in rent.
Recently, a major ISP in the Netherlands was determined to be streaming metadata from within their customer's networks to Lifemote, a Turkish AI company.
Here's a report in Dutch: https://tweakers.net/nieuws/245620/odido-router-stuurde-analyticsdata-naar-turks-ai-bedrijf.html
This is just the latest one to get caught doing it, but determine how comfortable you are having your internal network exposed to a 3rd party.
I've used personal/non-ISP modems and routers for 25 years because I'm not comfortable with it it. At all... But hey, you do you.
While I would say sending MAC Addresses and Wi-Fi names is very far from tracking everything you do on the internet, this highlight another very important point: The routers that provided by ISPs are usually very cheap and crappy, and this in itself security implications.
Like this example of pulling a script from an unverified HTTP source and executing it as root 🤯.. Not to mention that firewalling and port forward configuration options may be pretty simplified and limited.
This is why I got a mini PC with five Ethernet ports and configured it as a router/pihole.
Everything goes through a WireGuard VPN, and I have DNS that’s private.
And I know it’s secure because I wrote the iptables myself.
Owning your own modem/router gives you full access to security features. It gives you opportunity to install custom firmware. If you can spring for the $$, I think it would be advisable. That way, the only thing you need from your ISP is the cable/delivery device piping internet into your house.
You're ISP probably provides some overpriced really crap hardware that they probably have a back door to, that I'm also not about to screw around with. I've always had a router behind their modem/router combo for many reasons, the first being that I have had a 100 ft Ethernet cable since 2005 that let's me put my router where I want, I can place my wifi where it works best, not just within 6-10 feet of wherever someone 20 years ago decided to drill a hole. Second is because a ddwrt router is so much better than anything you'll get from your provider, and you can find pretty good compatible ones on eBay or at your local thrift store for cheap.
I've always begrudgingly purchased rather than rented from my provider because after a year or so it is usually paid for. So far I've purchased four modems over almost 20 years so it's worked out for me. As for the device itself, I don't trust it, but I'll still set some firewall rules just because. I have my router behind it where I do the real stuff. If I'm ever given a device that I need to connect for some sort of monitoring, like my solar panels or something like that, it can connect to my ISPs crap and do whatever sketchy shit it's gonna do.
I would get a router that supports an open source firmware or operating system like OpenWRT. Which one depends entirely on your use case. Getting a router from your ISP is fine if you're allowed to and capable of flashing it, and if you trust them (I'm lucky that I have an ISP with a track record of fighting for their users' privacy and integrity).
In addition to not trusting the privacy of stock firmware, OpenWRT provides a lot of useful features for self-hosting like local DNS for your services and a feature-rich firewall to, for example, block devices you don’t trust from phoning home.
Even if you control your router/modem, they still control the other end, it connects to. And some more infrastructure along the path. So i think it depends a bit where you're going with this. If you're worried about them doing packet inspection, or logging IP numbers you connect to, I don't think there's a big difference. They could do it anywhere. And they'll likely do it in some datacenter.
A router interfaces with your local network, though. So in theory a router can be used to connect to your internal devices and computers and maybe you have an open network share without password protection or something like that. But we're talking violating your constitutional rights here. It's highly illegal in most jurisdictions to enter your home and go through your stuff.
I'll buy my own router because I can then configure it to my liking. And my ISP charges way too much for renting one. And what I also do is not use my ISP's DNS service. That'd just send every domain name I open to their logfiles. Instead I use one from OpenNIC
Instead I use one from OpenNIC
Fast? How would it compare to the evil Cloudflare?
I did one DNS query and it took 22 msec with the nearest OpenNIC server and 24 msec with Cloudflare's 1.1.1.1
So dunno... roughly same responsiveness? Maybe OpenNIC is a tad faster? For a proper answer we'd need to do more measurements, though. And with OpenNIC you definitely need to pick a good server, not just any random one. They'll have different locations, different policies and they're in widely different datacenters.
I'll have to check it out. Thanks.
Acronyms, initialisms, abbreviations, contractions, and other phrases which expand to something larger, that I've seen in this thread:
| Fewer Letters | More Letters |
|---|---|
| CGNAT | Carrier-Grade NAT |
| DHCP | Dynamic Host Configuration Protocol, automates assignment of IPs when connecting to a network |
| DNS | Domain Name Service/System |
| HA | Home Assistant automation software |
| ~ | High Availability |
| HTTP | Hypertext Transfer Protocol, the Web |
| HTTPS | HTTP over SSL |
| IP | Internet Protocol |
| NAS | Network-Attached Storage |
| NAT | Network Address Translation |
| PiHole | Network-wide ad-blocker (DNS sinkhole) |
| RPi | Raspberry Pi brand of SBC |
| SBC | Single-Board Computer |
| SSD | Solid State Drive mass storage |
| SSH | Secure Shell for remote terminal access |
| SSL | Secure Sockets Layer, for transparent encryption |
| TLS | Transport Layer Security, supersedes SSL |
| VPN | Virtual Private Network |
| XMPP | Extensible Messaging and Presence Protocol ('Jabber') for open instant messaging |
16 acronyms in this thread; the most compressed thread commented on today has 7 acronyms.
[Thread #172 for this comm, first seen 16th Mar 2026, 17:50] [FAQ] [Full list] [Contact] [Source code]
Depends entirely on the ISP
It's extremely unlikely that they are going to do any kind of deep traffic inspection in the router/modem itself. Inspecting network traffic is very intensive though and gives very little value since almost all traffic is encrypted/HTTPS today, with all major browsers even showing scare warnings if's regular unencrypted HTTP. Potentially they could track DNS queries, but you can mitigate this with DNS over TLS or DNS over HTTPS (For best privacy I would recommend Mullvad: https://mullvad.net/en/help/dns-over-https-and-dns-over-tls)
And of course, make sure that anything you are self-hosting is encrypted and using proper HTTPS certificates. I would recommend setting up a reverse proxy like Nginx or Traefik that you expose. Then you can route to different internal services over the same port based on hostname. Also make sure you have a good certificate from Letsencrypt
Many German providers have hardcoded DNS servers in their rental routers though and they block everything from torrent directories to iptv sites.
The only thing they can realistically harcode is the DNS server their router's DHCP provides.
Just configure devices to not use that setting, also use DoH or DoT (which you should do anyway, not just to circumvent your router's settings).
I haven’t used such a router in decades, I just know from doing IT support at friends homes. These people have no clue how to get around these DNS filters.
These people have no clue how to get around these DNS filters.
But not thanks to the virtue of some effective blocking but just a lack of knowledge of the average user...
I have used several of those cheap routers over the years. And they simply can't block you from using encrypted DNS (unless they want to create giant blocklists and want to play wack-a-mole with DNS servers...).
So all they usually do is very low tech like ignoring the DNS you set in the router configuration and reroute it (or not providing such configuration in the first place). But they can effectively ony do so with unencrypted DNS.
With encrypted DNS they could at best try to block the default port used by DNSoverTLS but that still leaves DoH. And they can't block that because it's just regular encrypted HTTPS traffic (with the DNS quesry inside).
Iirc even Windows allows easy configuration of DoH nowadays (and for much longer if you were ready to edit the registry) where you can simply chose between unencrypted, DoH only or encryption preferred if available.
Most ISP's in the US are always looking for a government handout. When the government decides to tie that handout with a backdoor attached you will never know about it. If they control the router you don't get a choice.
Not to mention they buy the cheapest POS they can get to do the job. Then when the wifi sucks they will rent you some mesh nodes. And you can only hope they update them if there is a flaw.
I run OpnSense and have for about 10 years now. I've considered using a gPON sfp module so I can get rid of the ONT.
It's pretty simple if you don't own the router you don't own the Wi-Fi. You can treat your home Wi-Fi a little bit like a public Wi-Fi and just make sure all of your devices are secure using encrypted DNS and encrypted traffic and overall not open on any unsecured ports and you should be fine.
Personally, all of my services on my home server are only available through my WireGuard VPN, so it doesn't matter what Wi-Fi I'm using, it's always going to be encrypted peer-to-peer.
make sure all of your devices are secure using encrypted DNS and encrypted traffic
Which is so easy it really should be the default nowadays yet sadly isn't.
Most ISPs have remote access to their modems. You should use your own if possible. If you can't, then put it in bridge mode and connect your own router to it.