From Mullvad

  • @seven_phone@lemmy.world
    link
    fedilink
    English
    294 months ago

    It will all end with us back on dialup speeds once the counter-DAITA throughput machine learning de-obfuscation analysis of defense against AI guided traffic analysis of proxy anomised packets starts. I think I might just read a book.

    • @jet@hackertalks.com
      link
      fedilink
      English
      144 months ago

      Imagine a future where you and your VPN connection maintain 10mbps of constant, uniform traffic at all times. That solves the problem too, if the noise is aways high, you can’t see the signal

        • @jet@hackertalks.com
          link
          fedilink
          English
          13
          edit-2
          4 months ago

          Sure, but one of the benchmarks of a good cryptographic algorithm is to reduce the amount of meta information you can get from a random sampling. Most of the timing attacks are looking for traffic activity to pattern match ultimate source and receiver. If the encrypted tunnel is always exactly 10mbps of cryptographic traffic, then it would be much harder to identify

        • @pebbles@sh.itjust.works
          link
          fedilink
          English
          34 months ago

          If ya do it right, you can’t distinguish the signal from the noise. Encryption makes data look random. So if you send dummy random data then it just looks like constant random data. No signal is distinguishable.