Ник | Пост | Дата |
---|---|---|
tango | On the MASQUE list, Töma Gavrichenkov, claiming some inside knowledge, suggests a way to detect VPN users. They are the ones that have long-lived high-traffic connections, but never connect directly to web trackers (Google Analytics etc.). The idea is that because web tracking is so ubiquitous, non-VPN users are constantly connecting to tracking hosts, but VPN users who have all their connections tunnelled do not.
This is an interesting idea. The subsequent discussion on the list seems a little overblown, though. I think I agree with Ted Hardie and Ben Schwartz that there’s nothing fundamental about this traffic analysis attack that’s different from other traffic analysis attacks, and no reason to freak out about this one in particular. No one mentioned it on the list, but it seems to me that you could defeat this kind of attack anyway, by running a non-tunnelled web browser alongside your VPN? Let it refresh itself, just to ensure that some threshold of trackers are being contacted while you’re using the VPN. | 2019-12-12T18:55:40.457Z |
ValdikSS |
At least the message tells us that such systems are being developed and used, and we should expect them in a VPN-blocking countries like Turkmenistan sooner or later. | 2019-12-13T03:43:22.256Z |