736

Even if you have encrypted your traffic with a VPN (or the Tor Network), advanced traffic analysis is a growing threat against your privacy. Therefore, we now introduce DAITA.

Through constant packet sizes, random background traffic and data pattern distortion we are taking the first step in our battle against sophisticated traffic analysis.

you are viewing a single comment's thread
view the rest of the comments
[-] ramble81@lemm.ee 3 points 6 months ago
[-] jet@hackertalks.com 19 points 6 months ago* (last edited 6 months ago)

Not just tor. Tor plus random traffic.

Let's say across your VPN you always sent one megabyte per second of traffic even if you had nothing to say. And then everybody connected to the VPN endpoint did the same thing. Then it gets very difficult to actually follow the traffic flows of the encrypted packets. You don't see a large chunk of data passing through the network

[-] possiblylinux127@lemmy.zip -2 points 6 months ago

Tor does this to and is much better than a VPN

[-] jet@hackertalks.com 6 points 6 months ago

It does not generate random traffic on your link to Tor.

[-] possiblylinux127@lemmy.zip 0 points 6 months ago

No but people generate random traffic

[-] Aceticon@lemmy.world 6 points 6 months ago* (last edited 6 months ago)

The point is that for a state actor which can watch (or at least buy detailed traffic data for) both ends, a certain pattern of packets happenning from your side to a known Tor entry node and the exact same pattern between a specific server being watched and a known Tor exit node on the other side will indicate that it's your machine connecting to that end server, the more such patterns spotted the higher the level of confidence.

This is quite independent of how much your data is mixed with other data inside the Tor network and how many nodes it has been routed around, because this kind of analysis doesn't care about the IP address your machine is sending requests to or the IP address the watched server is receiving request from, it only cares about your pattern of data requests and responses matching that server's pattern of received requests and returned responses.

Whatever protocol is in the middle is wholly irrelevant. At best if the website is heavilly used and you're lucky, the specific end node (be it the router on the other side of your VPN connection or the exit node of your Tor connection) sending your requests to that server might have other users also sending requests to that server hence you're all disguising each other's pattern, but this is to do with popularity of the service more than the protocol itself being good at defeating this kind of analysis.

Edit

This is not entirelly true - if the protocol changes the exit node between requests to the server then it can disguise your pattern. However given that changing the IP address from were the request comes breaks all the keep-alive performance optimizations in HTTP since v1.1, performance would be horrible at least for web browsing in modern websites (which have tons of additional content associated with a typical webpage).

/Edit

It's all there in the Mullvad post (so you need to actually read it) and it helps if you have a background in IT Security and Cryptography since there are kinds of attack using similar mathematical principles in other areas (such as the statistical analysis of unchained symetrical encryption protocols to derive the text from the encrypted text based on the probability of the words and letters occuring in a specific pattern or the power consumption analysis of cryptographic microchips such as those in smartcards to derive the encryption keys based on the way power was drawn by the ALU during encryption and decryption, a weakness which was funnilly enough also defeated by adding noise in the form of junk operations).

It's all pretty obvious, really ;)

[-] possiblylinux127@lemmy.zip 2 points 6 months ago

I just think VPNs are over hyped. At the end of the day if someone is monitoring both sides it was game over a long time ago. Also there is no way to know what is on the other side of a VPN.

What would be interesting is a paid I2P or Tor exit proxy.

[-] Aceticon@lemmy.world 3 points 6 months ago

Oh yeah, people thinking that VPNs are the end-all of Privacy and Security against eavesdropping in the Internet aren't really informed enough to understand that there are quite a lot more attack vectors than just a person's IP address.

That said no-logging VPNs do remove one from the "low lying fruit" category for things like legal companies sending "gimme money because we detected you infringing our copyright" letters to people doing file sharing using things such as bittorrent. This is because they remove the easy way for such companies to get a person's information when detecting file sharing from a specific IP address: one thing is getting the target by a process as simple as sending an e-mail to a local ISP demanding the identification of a user using a certain IP at a certain time due to copyright infringement (using the laws made for just that purpose during the last couple of decades in several countries), a whole different ball game is to first having to get a Court Order in an altogether different jurisdiction to force the VPN provider to install some kind of wiretap-equivalent to catch such a user at a later time for a case of Copyright Infringement - it costs way too much, takes way too much time and has way too much risk of being laughed out of court (methaphorically speaking) to be worth it for a case of non-commercial Copyright Infringement, especially if there is an overabundance of easier targets.

As with everything else in this world, VPNs are good tools for certain jobs, not some kind of silver bullet for Privacy and Security against eavesdropping.

[-] jet@hackertalks.com 3 points 6 months ago

My philosophy is that a VPN is strictly better then your ISP logging all your traffic, and is part of basic data hygiene.

[-] jet@hackertalks.com 1 points 6 months ago

Very well written!

[-] possiblylinux127@lemmy.zip 5 points 6 months ago

Tor is much better than a VPN privacy wise. However, you are limited on speed and stuck with TCP.

this post was submitted on 07 May 2024
736 points (98.2% liked)

Technology

59708 readers
1604 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS