• 3 Posts
  • 90 Comments
Joined 1 year ago
cake
Cake day: June 15th, 2023

help-circle
  • I think it was more targeting the client ISP side, than the VPN provider side. So something like having your ISP monitor your connection (voluntarily or forced to with a warrant/law) and report if your connection activity matches that of someone accessing a certain site that your local government might not like for example. In that scenario they would be able to isolate it to at least individual customer accounts of an ISP, which usually know who you are or where to find you in order to provide service. I may be misunderstanding it though.

    Edit: On second reading, it looks like they might just be able to buy that info directly from monitoring companies and get much of what they need to do correlation at various points along a VPN-protected connection’s route. The Mullvad post has links to Vice articles describing the data that is being purchased by governments.


  • One example:

    By observing that when someone visits site X, it loads resources A, B, C, etc in a specific order with specific sizes, then with enough distinguishable resources loaded like that someone would be able to determine that you’re loading that site, even if it’s loaded inside a VPN connection. Think about when you load Lemmy.world, it loads the main page, then specific images and style sheets that may be recognizable sizes and are generally loaded in a particular order as they’re encountered in the main page, scripts, and things included in scripts. With enough data, instead of writing static rules to say x of size n was loaded, y of size m was loaded, etc, it can instead be used with an AI model trained on what connections to specific sites typically look like. They could even generate their own data for sites in both normal traffic and the VPN encrypted forms and correlate them together to better train their model for what it might look like when a site is accessed over a VPN. Overall, AI allows them to simplify and automate the identification process when given enough samples.

    Mullvad is working on enabling their VPN apps to: 1. pad the data to a single size so that the different resources are less identifiable and 2. send random data in the background so that there is more noise that has to be filtered out when matching patterns. I’m not sure about 3 to be honest.












  • Software on Windows is still a bit of a mess compared to most other platforms though. The fact that it is normalized to download and install things from the various developer websites, without much verification and without permissions/restrictions on what the apps can do is not a plus in my mind. winget has been helpful in managing the installation and updating of things though.

    Everyone having their own launcher is also not great, especially since they are not all created equal with respect to features, stability, and resource consumption. Games have had this problem for some time with EA, Ubisoft, Epic, etc having their own launchers. As like what happened to games, I don’t think it will necessarily end up with more freedom to buy the apps from the store you want, but rather you’ll be forced to download a store/launcher based on the whims of the app publisher. Some may publish to multiple stores but I don’t expect all to.

    If the mandate to open the platform up to more stores came with some kind of requirement that apps be available across multiple stores so that the stores actually had to be competitive on their own features, not app exclusivity, I would be more inclined to support having more stores.



  • In this case, it’s less about the actionability of going after the pirate and more about using them as a witness to go after the ISP with deeper pockets by showing they failed to kick pirating users off of their service. They don’t care that they downloaded it, they care that the users knew they wouldn’t get in trouble for piracy with that ISP and that the ISP benefited from that by keeping pirating users subscriptions active. Testimony from pirating users about why they chose that ISP and how even they knew the ISP wouldn’t do anything to resolve copyright violation issues could be pretty helpful in court.

    From the article:

    In this week’s filing, the film studios claim that six Redditors’ IP address logs are “clearly relevant and proportional to the needs of the case" because the Reddit users all made comments that either establish “that Frontier has not reasonably implemented a policy for terminating repeat infringers sufficient for a safe harbor affirmative” or that “the ability to freely pirate without consequence was a draw to becoming a subscriber of Frontier."

    Last year, a Reddit user wrote that they received 44 emails from Frontier threatening to cut off their service due to torrent downloads, but “if they didn’t do it after 44 emails … they won’t."

    In 2022, another Reddit user said that they had used Frontier DSL for years and “despite the shitty internet, they didn’t give a shit what I downloaded.”



  • It’s more that if you ask the app not to track you, there’s nothing stopping the server you’re connecting to with that app from continuing to track you. The server doesn’t even know you opened incognito mode versus just a different browser profile and it would be more of a risk for fingerprinting/sites blocking you if it did have the ability to know if you were in incognito.

    It’s not the browser that’s really the problem in this case, it’s the tracking and building of user profiles across browser profiles and devices on the server side.