Skip to content

sesamee

My feedback

1 result found

  1. 322 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    sesamee supported this idea  · 
    An error occurred while saving the comment
    sesamee commented  · 

    Absolutely, i'd argue this is one of the most crucial and pertinent features that should be added, i've been researching this specific attack and there's a few of papers showing that traffic-analysis based website fingerprinting is actually very practical, there's been one conducted on the tor network recently with AI, and they had about a 95% accuracy rating of being able to identify which websites or services a user was accessing.

    Largely this has to do with identifying unique patterns in traffic flow, using packet timings, packet lengths, and packet spikes to generate a unique profile for each website, and then analyzing the traffic of the victim, comparing those profiles to their traffic.

    While defenses against this type of attack are not avaliable on protonVPN, one thing you can do to protect yourself against such an attack in the meantime is running internet radio and twitch livestreams in the background.

    This will add significant noise to the traffic and make it substantially more difficult for someone to conduct such an attack.

    But protonVPN should absolutely add in a defense against this, mullvad implements DAITA essentially by 1. only transmitting packets within a certain packet size range, and 2. adding noise to the traffic, so it should not be too hard for proton to add in such a feature.

Feedback and Knowledge Base