Defense Against Traffic Analysis
Implementing an option that makes traffic analysis, done by AI or otherwise, more difficult. Similar to what Mullvad has created with DAITA

-
sesamee commented
Absolutely, i'd argue this is one of the most crucial and pertinent features that should be added, i've been researching this specific attack and there's a few of papers showing that traffic-analysis based website fingerprinting is actually very practical, there's been one conducted on the tor network recently with AI, and they had about a 95% accuracy rating of being able to identify which websites or services a user was accessing.
Largely this has to do with identifying unique patterns in traffic flow, using packet timings, packet lengths, and packet spikes to generate a unique profile for each website, and then analyzing the traffic of the victim, comparing those profiles to their traffic.
While defenses against this type of attack are not avaliable on protonVPN, one thing you can do to protect yourself against such an attack in the meantime is running internet radio and twitch livestreams in the background.
This will add significant noise to the traffic and make it substantially more difficult for someone to conduct such an attack.
But protonVPN should absolutely add in a defense against this, mullvad implements DAITA essentially by 1. only transmitting packets within a certain packet size range, and 2. adding noise to the traffic, so it should not be too hard for proton to add in such a feature.
-
Tate G commented
Yes it would be great help for my new https://airballinghou.com/ business
-
Proton User commented
Read more about DAITA here:
https://mullvad.net/en/vpn/daita