Mar 292017
 

As noted here it’s likely that if not already, soon not only will you be paying exorbitant monopoly rates for internet access, the ISP will also sell your web browsing history.

There are many ways you can protect yourself, TOR comes to mind however the performance trade offs are often not worth it.  Personally I block java/javascript, cookies, 40,000 or so domains, ads, tracking sites AND often pipe traffic through Privoxy and TOR.   These tactics assure that my ISP is not getting a complete picture.   However all of this is a hassle, so my wife/guests/etc are not likely to put up with it.

There’s another option, fill their database with so much garbage that it’s useless.  This will not defend against ISP’s selling your data, however if enough people shovel enough shit into the system the buyers will eventually realize the data is useless and stop buying.

Introducing Obfuscatron GIGO 0.1.0.12 this is a start.  I would love to see more people create more systems like this, run them all!  Fill their databases with garbage that is indistinguishable from real data!

If there’s enough interest I’ll keep enhancing this.  One idea I have is to provide a list of Zip codes for the U.S. and allow URL’s in the ‘seeds.txt’ list to contain place holders like %ZIP% that the system replaces with a random zip code..  May be useful for weather and travel sites.

If you have any questions/concerns or would like source code, leave a comment here.

NOTE: this works best if you have a computer that’s on 24×7.  If your computer goes to sleep, so will this.  It’s likely still helpful, just a bit less due to leaking your PC active hours (that may reveal when you work, got to school, come home, etc).

Mar 232017
 

According to art-technica: https://arstechnica.com/tech-policy/2017/03/senate-votes-to-let-isps-sell-your-web-browsing-history-to-advertisers/

The fix is easy, obfuscate.. fill their database with garbage that’s indistinguishable from real traffic.  For the do-it-yourselfer that it willing to accept some risk, running a TOR exit node would likely do the job.

For people who want a bit more control over the process, this is the official announcement for the Obfuscatron!  In short it’s a windows service (I’ll write a *nix deamon is there’s any demand) that will run in the background and generate very random web traffic.  The starting sources will be based on the Wikipedia random article function, however from there is will go out to external links on the page.  You will also be able to control the user agent, as well as configure how aggressive it is.

Currently in very early alpha, I’ll be running a version of this locally over the next several days and refining as I go.  Expect an available beta version in a couple of weeks.

I can’t imagine how they’d be able to distinguish this traffic from user traffic..  as long as it’s random enough and not just a constant stream of traffic going to a small set of sites.