On F-Droid and Droid-ify there is a very useful app called MockTraffic (all one word). This will increase your privacy by protecting you from ISP web traffic analysis. It does this by generating fake DNS and HTTP request.
Imagine you have 4 cars in a parking lot and you told someone to find them it would be easy if it’s only those 4 cars. But now add hundreds of cars to that same parking lot and tell them to find it. Difficulty spike.
I see so much wrong in these claims.
- Anyone analyzing your traffic is not just doing so based on DNS queries. They use Deep Packet Inspection (DPI) and they track packets across the Internet to find out what you’re doing. A fake request won’t fool them.
- Similarly, they use machine learning and behavioral analysis, which won’t be fooled either by a bunch of DNS queries.
- The increased noise could be detected as malicious activity, like a DDOS attack. You can find yourself rate limited, and your network performance can drop substantially.
- If the fake requests are real websites, your IP address can become associated with a wider range of interests, leading to more targeted advertising.
- Instead of using a simpleton’s approach that won’t work, use real protection. Use a paid-for VPN, or at least a reputable free one (not many) with built-in ad and tracker blocking to bypass your ISP.
**The App sounds fishy, actually. ** Many apps come out claiming to provide some unique security, and they eventually turn rogue and start stealing information. This one sounds ripe to go rogue, especially since it can’t make it into the standard store. I expect to read about MockTraffic someday being caught stealing information.
I wouldn’t go near it.
I wont claim this gives protection without analysis of the data they create. But if «they» can «deep packet inspect» my https traffic what makes vpn any different? If “they” have capabilities to trace my packets outside of their own network too that means they can follow me through the vpn server too.
Probably cheaper to just ask mossad for the vpn logs though.
Fake traffic has been used by military equipment for at least 25 years for obscuring real traffic.
You have to trust someone. There’s no way around this. But trusting some app written by some unknown person that has nobody overseeing it is probably the worst place to put your trust.
So, decide. You either trust some unknown app developer, your ISP, or a VPN provider. You must choose one. Which one do you choose? Choosing none means you are off the Internet.
I have more trust in Proton VPN, Mullvad VPN, Mozilla VPN, and some other reputable VPN providers than I do in my ISP, some cheap VPN run by unknown people, or some app making crazy claims. I strongly doubt that a reputable VPN provider is doing any tracking of user traffic. But I bet MockTraffic is telling someone all the websites you’re visiting.
I think if you are worried about your traffic being tracked, you are safest with a reputable VPN provider.
https://netsec.ethz.ch/publications/papers/chen_taranet_eurosp18.pdf
https://mice.cs.columbia.edu/getTechreport.php?format=pdf&techreportID=1455
These are some interesting reads about this topic from my notes when I was looking into it a while ago.
Ultimately I ended up with Safing SPN which tunnels each of your connections through random multihop VPN and you can customize it per app or per domain/ip with indepth rules. (They are working on an android app but it might take a while)
Custom onion protocols are a totally different thing though. Also my ISP don’t fulfil 3.2 of that paper.
I would guess using an app that fills up unused bandwidth over vpn could create a pretty steady stream of data not too far off these flowlet data.
From my understanding this taranet would be kinda like a vpn, with an ingress endpoint and egress endpoint. If this all powerful ISP can watch both endpoints would it not be able to trace you outside of the taranet network?
I wasn’t sure until þis:
This one sounds ripe to go rogue, especially since it can’t make it into the standard store.
but you have to be trolling.
A paid VPN that has your name and debit card information is more of a risk. But I can see why you would think thatcs the safer route. The average consumer has been told so for so long. Also in use adblock. I don’t see ads ANYWHERE online. Also read the source code if you think the app is fishy. If you never used it be quiet. One doesn’t say a car handles bad and drives lackluster before driving it mate.
A paid VPN that has your name and debit card information is more of a risk.
Depends on the service provider. Mullvad has an ID that I use. Nothing else is associated with it. Payment is done with vouchers through that ID.
This will increase your privacy by protecting you from ISP web traffic analysis. It does this by generating fake DNS and HTTP request.
If you’re the kind of attacker in a position to be doing traffic analysis in the first place, I suspect that there are a number of ways to filter this sort of thing out. And it’s fundamentally only generating a small amount of noise. I suspect that most people who would be worried about traffic analysis are less worried about someone monitoring their traffic knowing that it’s really 20% of their traffic going to
particular-domain.com
instead of just 2% of their traffic, and more that they don’t know it to be known that they’re talking toparticular-domain.com
at all.For DNS, I think that most users are likely better-off either using a VPN to a VPN provider that they’re comfortable with, DNS-over-HTTP, or DNSSEC.
HTTPS itself will protect a lot of information, though not the IP address being connected to (which is a significant amount of information, especially with the move to IPv6), analysis of the encrypted data being requested (which I’m sure could be fingerprinted to some degree for specific sites to get some limited idea of what a user is doing even inside an encrypted tunnel). A VPN is probably the best bet to deal with an ISP that might be monitoring traffic.
There are also apparently some attempts at addressing the fact that TLS’s SNI exposes domain names in clear text to someone monitoring a connection — so someone may not know exactly what you’re sending, but knowing the domain you’re connecting to may itself be an issue.
In a quick test, whatever attempts to mitigate this have actually been deployed, SNI still seems to expose the domain in plaintext for the random sites that I tried.
$ sudo tcpdump -w packets.pcap port https
<browses to a few test websites in Chromium, since I’m typing this in Firefox, then kills off
tcpdump
process>$ tshark -r packets.pcap -2 -R ssl.handshake.extensions_server_name
I see microsoft.com, google.com, olio.cafe (my current home instance), and cloudflare.net have plaintext SNI entries show up. My guess is that if they aren’t deploying something to avoid exposure of their domain name, most sites probably aren’t either.
In general, if you’re worried about your ISP snooping on your traffic, my suggestion is that the easiest fix is probably to choose a VPN provider that you do trust and pass your traffic through that VPN. The VPN provider will know who you’re talking to, but you aren’t constrained by geography in VPN provider choice, unlike ISP choice. If you aren’t willing to spend anything on this, maybe something like Tor, I2P, or, if you can avoid the regular Web entirely for whatever your use case is, even Hyphanet.
There are a multitude of ways to do something. What I was naming is just another. I’ve been running mocktraffic for about 3 hours and it has sent over 2800 mock request. That is a lot of noise