Defense Against Traffic Analysis
Implementing an option that makes traffic analysis, done by AI or otherwise, more difficult. Similar to what Mullvad has created with DAITA
-
Thomas Gill commented
Before signing any purchase agreement, use this https://runtporplacaco.com free government tool to uncover liens , unpaid fines , and ownership disputes , ensuring your vehicle meets all legal requirements in Colombia by 2026.
-
Noname
commented
Indeed, Proton absolutely must provide a concrete solution to this type of surveillance, especially when the competition is innovating...
-
Sombody
commented
proton is getting old by the second by missing these features.
-
David
commented
Agree. Stealth helps, but it doesn’t really defeat traffic analysis. On many restrictive networks it still gets fingerprinted or blocked.
One practical improvement would be adding support for AmneziaWG as an additional stealth-class protocol. It’s open source, WireGuard-based, and specifically designed to reduce protocol fingerprinting by altering handshake and packet characteristics. Other VPNs already use it where TLS-style obfuscation isn’t enough.
This wouldn’t replace Stealth, just complement it. Protocol diversity is one of the few defenses that actually works against active traffic analysis.
-
Amua commented
I agree
-
Jason Vinion commented
This is a must have and is mandatory for privacy if proton wants to stay up to date with security concerns.
-
Lukas Mayer
commented
Proton's VPN is a significant part of my paid plan's value proposition.
As other services adapted to higher traffic analysis capabilities of adversaries and have heavily invested in research, even Proton's more secure 'Secure Core' technology feels very 'legacy' compared to the more advanced solutions that others have already mentioned here.
-
cpu world commented
Here's a comment you can post on the Proton VPN DAITA page about your UK IP connection issue:
I'm experiencing an interesting issue with UK IP connections that I'm hoping someone can help explain. When I connect to a UK server and try to access my WordPress website (https://thorpeparktickets.co.uk/), the site initially appears blocked or doesn't load properly. However, when I access other UK websites, they work perfectly fine. Strangely, if I refresh the page, my website then loads correctly.
This seems to happen consistently only with my WordPress site when using UK IPs from ProtonVPN. Other country IPs work fine for my site, and other UK sites work fine with UK IPs - it's just this specific combination that causes the initial loading issue.
Has anyone experienced similar behavior? Could this be related to:WordPress security plugins detecting VPN traffic patterns?
CDN/caching issues with UK-based servers?
Some kind of geo-blocking mechanism that's confused by the VPN connection?The fact that a simple refresh fixes it makes me think it might be a caching or initial handshake issue rather than a true block. Would love to hear if others have encountered this with WordPress sites and UK servers, and if DAITA might help with this kind of traffic analysis issue.
Any insights would be appreciated! -
charlie
commented
100 percent for this, yes it can reduce speed but if anyone doesn't like that trade off they don't have to use it. It should obviously be optional but it should definitely exist.
-
5UR
commented
+1
-
Anon
commented
Like NYM & Safing SPN
-
Vasiliy Wood
commented
+1
-
nifon
commented
Defense Against Traffic Analysis is mandatory for privacy and for peace of mind.
-
Wasim akreen commented
NICE
-
Gemini commented
Doesnt stealth mode do that
-
Jerry Gen commented
I am also looking for this.
-
pupilcrow
commented
Obscura VPN, Tor, and Nym have also done research on this subject:
https://obscura.net/#obfuscation
https://www.privacyguides.org/en/advanced/tor-overview/#tor-usage-is-not-undetectable
https://nym.com/mixnet
I think Proton could take some inspiration from them! -
Nuesha Brunelli commented
Information link, Karlstad University, about DAITA:
"Researcher Tobias Pulls from the Department of Computer Science at Karlstad University, together with the Gothenburg-based company Mullvad VPN, has developed a new protection named DAITA ("Defense against AI-guided Traffic Analysis").
The protection against the rapid AI development in traffic analysis is available in Mullvad's VPN app on various platforms throughout the year, which has over a million downloads worldwide."
-
Nuesha Brunelli commented
I use DAITA too, I see no drastic drop in speed. It might depend of which server you are using to connect and of how many features you activate in the app or even which DNS is used.
-
Bird
commented
Just sharing my experience. I have been testing DAITA Mullvad feature and on my country the drop speed was around 70%.
I am not against implementing it, but think it twice on how implement this feature as it doesn't seem easy and efficient