Fauxx Data poisoning for your everyday tracking
from hornedfiend@sopuli.xyz to privacy@lemmy.ml on 15 May 20:50
https://sopuli.xyz/post/45741246

Fauxx is an open-source Android privacy tool that poisons data broker and ad-tech profiles by generating continuous, plausible, off-demographic synthetic activity from your device. The goal is simple: make your real behavioral signal statistically indistinguishable from noise.

Not my project, but though this is really cool and worth sharing.

#privacy

threaded - newest

Runecrush376@lemmy.world on 15 May 20:54 next collapse

I just found this app on droidify, really cool idea. Id love to see something similar on Linux. (imnotsure if something like that already exists)

crow@leminal.space on 15 May 21:11 next collapse

Interesting, how useful is it if I’m always behind a VPN and browse privately (hardened browser, ad blocker, no-script, never logged in etc.)?

May be wrong but the way I see it it doesn’t help me much?

f3nyx@lemmy.ml on 15 May 22:04 collapse

i only did a quick readthrough so my understanding of how it works is probably flawed. that said:

you could consider split-tunneling a browser outside of your normal stack for fauxx to pollute. that way your real activity remains as close to “ghost” as possible, and gives your device a fake fingerprint that will fool anyone not directly targeting you.

the reason I’d suggest doing it that way is that nobody’s personal device hygiene is perfect. flooding with synthetic data is a great way to help conceal when you slip up.

Mister_Hangman@lemmy.world on 15 May 22:08 next collapse

Go further. I’m listening like a regard trying to understand

f3nyx@lemmy.ml on 15 May 22:49 collapse

you’re kind of giving me a blank slate to talk here so let me hit the biggest point that is tangential to this conversation.

the easiest point for me to make is that if, on your phone, you bought your SIM card (and attached phone number) with payment info that can be tracked to your bank and your real name, your location is compromised whenever that card is online. this is something that the vast majority of privacy enthusiasts either neglect due to lack of knowledge, or cannot afford to remove from their threat profile due to the pervasiveness of cell networks in day to day life.

The most recent example i can give of this being necessary to consider in your privacy posture: In the US, ICE is using this combination of personal information and compromised locations to focus their efforts in neighborhoods with a primarily minority population.

rhythmisaprancer@quokk.au on 16 May 02:48 collapse

whenever that card is online

Do you mean when the card is an active card viable for use? Or stored in the phone somehow? I’m curious what online means and if I am doing it… I don’t have any payments connected to a mobile phone but I do have a SIM card, probably paid for with a now expired card.

f3nyx@lemmy.ml on 16 May 04:06 collapse

basically, a SIM is what connects your phone to your mobile provider’s network. Any time you want to use that infrastructure (the phone turns on, you turn off airplane mode, you turn on your eSIM) your phone makes a request to the network, which requires an authentication via the IMSI number provided by the SIM. When this happens, your location is triangulated and your status as a cell network subscriber is verified. this process also happens periodically, and more frequently if you’re on the move. The technical reason for this is that your phone needs to know which towers to route requests to, and that you are paying for the service.

Theoretically, your phone is capable of being triangulated even without a SIM. However, for this to happen (outside of calling emergency services) as far as I’m aware this requires some sort of device compromise and is therefore out of most people’s scope. If you’re paranoid of tracking, remove your sim (or disable it if it is an eSIM) and if you’re super paranoid, grab a faraday bag to put it in.

let me know if i didnt explain anything well enough.

rhythmisaprancer@quokk.au on 16 May 04:24 next collapse

Thanks! Now I think that when you said “card is online” you meant the SIM card, not credit card. I use an alternative OS that, as I understand it, does a little to offset the tracking but it is, indeed, outside of my scope! I mostly have my phone on airplane mode, even away from home, but of course not always. I do know that this OS eliminates the ability for the phone to call home when on airplane mode.

racoon@lemmy.ml on 16 May 11:31 collapse

Your location can be triangulated by reading neighbouring wifi SSID names, because every SSID and MAC identifiers are on a huge database scrapped by rolling slowly along every road and every street. Probably by the same people who took pictures for google maps and etc.

f3nyx@lemmy.ml on 16 May 20:21 collapse

I’m going to be a little pedantic here, I hope you don’t mind.

I wouldn’t say your location can be triangulated by SSID. you’re 100% correct about them being findable online, and that’s why its important to rotate your said every few months to a year. also, don’t be creative with it, just have it be the generic manufacturer string or something similar if you can.

with that database, people can tell where you’ve BEEN, not where you ARE. it doesn’t necessarily compromise your immediate location.

however, yes, it can assist with that. most phones, when not connected to WiFi, broadcast all the SSIDs they have saved in an attempt to connect to one of them. that’s another fingerprint. the caveat is that someone needs to be relatively close to you to be able to snoop those broadcasts, or have a device installed somewhere that’s snooping all traffic. in those cases someone is already following you or you’re (probably) in a fairly public place.

this is also an easy one to foil. when you leave a location where you connect to WiFi, turn your WiFi off so that your phone isn’t constantly broadcasting for it. this saves battery as a nice bonus. grapheneOS enables this by default.

crow@leminal.space on 16 May 11:58 collapse

nobody’s personal device hygiene is perfect

fair point. guess I’ll try to understand a bit better how everything works before making a decision

side note: I like how in this thread we have a crow, a f3nyx and a raccoon lol

leoj@piefed.zip on 15 May 21:34 next collapse

I wonder if you could set up a second phone that is logged in with all your accounts, then use it for FAUXX, currently concerned about battery usage / background usage of device.

Like, does it need to be running continuously ALL DAY to effectively poison? Or is sometimes usage helpful? Second phone idea solid?

Anyone understand the data collection better have thoughts?

adespoton@lemmy.ca on 15 May 22:11 collapse

This method wouldn’t combat device fingerprinting, so it would be trivial for everyone but the aggregate data brokers to filter out as noise.

For a strategy like this to work, your legitimate traffic needs to be indistinguishable from the random traffic.

leoj@piefed.zip on 15 May 22:14 collapse

So basically it has to be running while you’re using it, and on the device your primarily use?

f3nyx@lemmy.ml on 15 May 22:40 collapse

not necessarily. if ‘you’ are sending traffic, i (someone interested in your data) don’t really care where it comes from. Em is correct that it’s trivial to filter out, but it’s also another data point that is interesting and potentially relevant for them, so in practice they won’t.

tracking has gotten to the point where they can infer connections based off of users that have no interaction but otherwise share a location for a period of time (think coffee shop wifi, work). you have things in common with those people. maybe not a lot, but enough to be relevant in someone’s dataset somewhere.

so no, it doesn’t have to be running on your primary device to be relevant. i’d argue that it simply being on your home network would be enough.

sjkhgsi@lemmy.lynas.ca on 15 May 22:16 next collapse

That’s cool!

FauxLiving@lemmy.world on 16 May 02:16 next collapse

No relation

comrade_twisty@feddit.org on 16 May 07:55 next collapse

This is great! I wanted something like this for a long time.

Any suggestions for something similar that runs on a linux desktop?

I used TrackMeNot extension for Firefox in the past, but it has been abandoned and not updated in close to 10 years.

hornedfiend@sopuli.xyz on 16 May 09:10 next collapse

I think what you’re looking for is AdNauseam.

comrade_twisty@feddit.org on 16 May 09:25 next collapse

Afaik that won’t really work due to pihole on my network.

acido@feddit.it on 16 May 18:38 next collapse

AdNauseam works on pages you are visiting, as far as I understood.

Fauxx instead does its thing independently in the background.

comrade_twisty@feddit.org on 16 May 22:24 collapse

Something like this is an interesting approach:

github.com/madereddy/noisy

GalacticGrapefruit@lemmy.world on 16 May 18:42 collapse

I’d advise switching from Firefox to Mullvad Browser. They have a window size protection tool built in to obfuscate your actual screen size, as well as some other cool goodies.

hexagonwin@lemmy.today on 16 May 19:06 collapse

the window size protection you mention is a firefox feature called RFP and can be enabled on vanilla firefox as well.

racoon@lemmy.ml on 16 May 11:28 next collapse

Isn’t it easier to browse with JavaScript off whenever possible and with uBlock origin?

acido@feddit.it on 16 May 18:36 next collapse

just as an FYI, having JavaScript off potentially adds to your fingerprint.

racoon@lemmy.ml on 17 May 19:04 collapse

Everything adds to my fingerprint. Nothing minuses to it. No matter what i tried

hexagonwin@lemmy.today on 16 May 19:05 collapse

it’s a difference approach, OP maximizes the data being harvested to make it harder to tell what the real usage data is, turning off javascript minimizes the data being collected but potentially makes you unique and stand out among other vanilla users

MonkderVierte@lemmy.zip on 16 May 11:53 next collapse

Ok, but how does it work? Not the faux data generation part detailed on the git (which OP didn’t link btw) but how it injects/intercepts the data.
There are magisk modules for this kind of thing, because what can be faked is severely limited without the ability to mess with other apps or the system.

Does it put a local VPN or what?

acido@feddit.it on 16 May 18:42 next collapse

started using it today, it still is in early stages of development and it’s pretty bugged, but it’s very cool.

the main doubt I have now is if it would be more useful of you could fake activity coherent with your location, for example, because being in EU and faking visits to US gov sites doesn’t exactly sound as stealth.

I could be wrong though.

UkrainianBull@reddthat.com on 16 May 21:19 next collapse

Why would you not post a link? f-droid.org/packages/com.fauxx.full

SocialistVibes01@lemmy.ml on 17 May 00:37 collapse

Really cool. The dev is doing Che’s work