Oisteink

joined 2 years ago
[–] Oisteink@lemmy.world 3 points 1 day ago

Custom onion protocols are a totally different thing though. Also my ISP don’t fulfil 3.2 of that paper.

I would guess using an app that fills up unused bandwidth over vpn could create a pretty steady stream of data not too far off these flowlet data.

From my understanding this taranet would be kinda like a vpn, with an ingress endpoint and egress endpoint. If this all powerful ISP can watch both endpoints would it not be able to trace you outside of the taranet network?

[–] Oisteink@lemmy.world 2 points 1 day ago (3 children)

I wont claim this gives protection without analysis of the data they create. But if «they» can «deep packet inspect» my https traffic what makes vpn any different? If “they” have capabilities to trace my packets outside of their own network too that means they can follow me through the vpn server too.

Probably cheaper to just ask mossad for the vpn logs though.

Fake traffic has been used by military equipment for at least 25 years for obscuring real traffic.

[–] Oisteink@lemmy.world 3 points 1 week ago

Sometimes context gives it off, other times you can apply an cheap version off Occam’s razor and just consider that the race version would be absurd and it’s likely the colour of the brief’s

[–] Oisteink@lemmy.world 10 points 1 week ago (8 children)

OP writes «white men’s briefs» while it’s clearly about white men’s briefs

[–] Oisteink@lemmy.world 12 points 2 weeks ago

It’s bytes downloaded divided by bytes uploaded. Torrents are distributed so more often than not you download a file from several seeders