Integration of noisy.py

3 Posts
3 Users
1 Reactions
174 Views
(@tuxxer)
Trusted Member
Joined: 4 Jahren ago
Posts: 33
Topic starter  

By random I found a github project called noisy.py ( https://github.com/1tayH/noisy ), which "generates random HTTP/DNS traffic noise in the background while you go about your regular web browsing, to make your web traffic data less valuable for selling and for extra obscurity."

Do you think an integration into eblocker would be a privacy improvement?

Client OS
Browser
eBlocker hardware
eBlockerOS version

   
ReplyQuote
(@random)
Illustrious Member Admin
Joined: 6 Jahren ago
Posts: 2066
 
Posted by: @tuxxer

generates random HTTP/DNS traffic noise in the background

I‘m not sure about the application and benefit for eBlocker yet.

As all third party trackers/data collectors are blocked by eBlocker - who are you gonna fool with this tool? The first party website you visit? But then how would this help to

Posted by: @tuxxer

make your web traffic data less valuable for selling

if the sale is always thru third party data collectors?

In other word, please name a website that today uses first party data (not collected by third party collectors) to sell user’s click stream. 🤔

For more background you might want to check out this thread about how fingerprinting and cross-site tracking works: https://eblocker.org/community/main-forum/fingerprint-test-with-www-amiunique-org/

Remember, that without cross-site tracking the single first party data has literally no value for anyone… - and as far as I understand thats what noisy.py tries to generate.

At least I’m not aware of such a data sell schema and it would be great if someone could enlighten me. So literally answer the question: „how would noisy.py benefit eBlocker from a real threat perspective? So where is today‘s threat that noisy.py would prevent? I can‘t see it 🤔🧐

THX!


   
ReplyQuote
(@benne)
Famed Member Admin
Joined: 6 Jahren ago
Posts: 1086
 

@random

I could think of one application where "fake traffic" could become helpful in conjunction with eBlocker: In case you distrust your ISP or VPN provider.

Even if you use the eBlocker firewall to spread DNS requests to other (than your provider´s) servers, the (VPN) provider can still log and analyze the TCP/IP packets (as they always see the packet destination, unless Tor is used) and build a profile on this basis. 

To my knowledge ISPs in the US are allowed to sell customer surfing profiles but this practice is not legal in Europe. Based on where you live chances of risks may vary... 😉 

Nevertheless, it's probably not much of a thing to integrate this script. BUT to implement a GUI and to really understand what the code does and maintain it in future, there is still quite some coding to be done.

I'll bring up this topic of integrating noisy (or something similar) in the next eBlocker supporters meeting (end of June) and maybe some volunteer is picking up the idea.

Thanks very much @tuXXer for bringing it up! Keep up your great contributions... 🤗 


   
Random reacted
ReplyQuote

Nach oben scrollen