Incorporate technology to fend off website fingerprinting
Posted: Tue Sep 06, 2011 6:30 pm
I was reading a blog on Tor's site entitled "Experimental Defense for Website Traffic Fingerprinting" (URL is https://blog.torproject.org/blog/ ) when a portion of the blog caught my eye. It reads as follows:
"Website fingerprinting is the act of recognizing web traffic through surveillance despite the use of encryption or anonymizing software."
"This information can be used to recognize your web traffic despite attempts at encryption or tunneling."
"Early work was quick to determine that simple packet-based encryption schemes (such as wireless and/or VPN encryption) were insufficient to prevent recognition of traffic patterns created by popular websites in the encrypted stream. Later, a small-scale study determined that a lot of information could be extracted from HTTPS streams using these same approaches against specific websites."
My question is: Is OpenVPN able to fend off website traffic fingerprinting? If the answer is "No", do the developers of OpenVPN plan to incorporate technologies to ward off such fingerprinting?
"Website fingerprinting is the act of recognizing web traffic through surveillance despite the use of encryption or anonymizing software."
"This information can be used to recognize your web traffic despite attempts at encryption or tunneling."
"Early work was quick to determine that simple packet-based encryption schemes (such as wireless and/or VPN encryption) were insufficient to prevent recognition of traffic patterns created by popular websites in the encrypted stream. Later, a small-scale study determined that a lot of information could be extracted from HTTPS streams using these same approaches against specific websites."
My question is: Is OpenVPN able to fend off website traffic fingerprinting? If the answer is "No", do the developers of OpenVPN plan to incorporate technologies to ward off such fingerprinting?