HTTPS won't keep your ISP from determining what videos you're streaming

spectrum.ieee.org/automaton/robotics/drones/otherlab-apsara-aerial-delivery-system
>Many commercial video streaming services (Netflix is not the only offender) use a set of methods that make this kind of fingerprinting possible. The first, called MPEG-DASH breaks down the content of a video into smaller parts. When you live stream a video, you are actually watching a long playlist of individual chunks that vary in their quality depending on the speed of your network. DASH specifies which chunks make it to your browser.
>The second protocol is called variable bitrate encryption and it is a way of eliminating redundancy in successive data bursts to reduce the size of the files that get sent to you. As a scene plays out, VBR protocols compare every new video frame with the one that came before it and eliminate the features of the content that stayed the same. This means that streaming a chaotic action scene, where everything on the screen is constantly changing, would require a series of much larger data bursts, relative to the final credits of a movie, where nearly everything on the screen remains black.
>These two features of the network traffic are unique enough that they can be used as fingerprints for individual videos.
Anyone just using Tor/I2P with javascript always disabled for everything yet?

Other urls found in this thread:

spectrum.ieee.org/tech-talk/telecom/security/we-know-what-youre-watching-even-if-its-encrypted
twitter.com/SFWRedditVideos

Your article didn't match your post. I know this is probably a troll but for fucks sake stop recommending Tor.

The US govenrment owns the vast majority of the nodes and the design of the network routes more than half the traffic out of exit nodes in Washington DC.

Tor's vulnerabilities have been known for decades now and it's not meant to be seen as a secure platform anymore. NSA has several means of knowing what you're doing in the network.

Just download the video and watch it offline.

Correct article:
spectrum.ieee.org/tech-talk/telecom/security/we-know-what-youre-watching-even-if-its-encrypted

>The US govenrment owns the vast majority of the nodes and the design of the network routes more than half the traffic out of exit nodes in Washington DC.
Source?

>NSA has several means of knowing what you're doing in the network.
Again, source? The Snowden leaks showed the opposite.

Snowden leaks were a limited hangout. Everything he "leaked" was already public knowledge.

>Everything he "leaked" was already public knowledge.
I suggest you actually read the Snowden leaks before talking out of your ass.

that isn't how VBR works unless it's over UDP though

>that isn't how VBR works unless it's over UDP though
The article is about streaming video you mongoloid. You stream videos using UDP.

Download a video over https and watch it in a player.

Protip: it's still illegal for your ISP to packet snoop, just like it's illegal for your phone carrier to listen in on your phone calls.

All your ISP knows is what IP addresses you're connecting to, at what time, and how much data was transmitted. It's like your phone carrier knowing what phone numbers you dialed, at what time, and for how long.

It's still a lot of data on you (although probably not too useful since the ISP can't really link it to a specific user, just a residence), but stop pretending that they're going to break federal law to attempt to snoop on the contents of packets. Fuck, even if they wanted to, I doubt ISPs have the processing power required to do that for all their users, and the costs would massively outweigh the benefits.

>it's still illegal for your ISP to packet snoop
Which is why AT&T was doing exactly that back in 2015 under their "internet preferences" program and only stopped after consumer outrage and not government action?

>The US govenrment owns the vast majority of the nodes and the design of the network routes more than half the traffic out of exit nodes in Washington DC.
>Tor's vulnerabilities have been known for decades now and it's not meant to be seen as a secure platform anymore. NSA has several means of knowing what you're doing in the network.

This. Just get a VPN you cheap fucks if it's that important to you. This entire ISP thing is being way overblown, stay gay

>This entire ISP thing is being way overblown
What's overblown about what the OP posted?

it doesn't matter if your ISP can see what video you're watching when they still fall under the jurisdiction of the FTC. Even with fully functional HTTPS and no leaking they can still see the full address and page headers. The paranoia is getting to be a bit much for anyone not willing to pay the huge sum of $3/month for a virtual private network. Stay poor faggots

VPN won't matter once vpn connections are throttled to shit after NN gets repealed.

>starts spouting talking abouts about the bill Trump recently signed despite no one mentioning it
>demonstrates a lack of knowledge about TLS and SSL work
Sure smells like shill here. Also, HTTP headers are encrypted when using TLS or SSL, along with all other data from the application layer.

>things that will never happen

businesses rely on it dipshit

>crying about rules lost that wouldn't have gone into effect until December 2017

literally nothing changed, you are the shill [for Netflix, YouTube, Amazon]

>businesses rely on it dipshit
Businesses already pay for business class connections.

>literally nothing changed
The Ninth Circuit struck down the previous privacy laws last year. The laws being repealed were the replacement. It's open season now.

>what is a laptop for field employees

No, it's not. It reverts back to the FTC and ISP privacy rules fall under the same jurisdiction Google, Facebook, and all other Internet companies. It's fucking nothing

you don't know what you are talking about

If you had any comprehension of the words written you'd realise that Tor isn't immune from these VBR data patterns either.

You get around if by fucking downloading other files in the background you idiot. Run a little script that randomly downloads data from somewhere else on the website. Or watch two videos at once, one muted in the background.

The point is to mask your data usage patterns, not to hide what you're actually sending.

I swear, people here are braindead.

seriously, i can't think of a situation where i need the convenience of streaming with NSA proof security

>most
>5 of them

The US government needs to own roughly 90% of the nodes to get anywhere near reliable deanonymisation.
It works like this; you get 0% de-anonymisation below, say, 85% ownage, and then it shoots up as it gets to 100%.
The US government owns like 40%

Good, continue your activities, goy.

simplest and best way to solve this problem: stop watching CP

>It reverts back to the FTC
Those are the rules that the ninth circuit turned over. That was the reason the FCC rules were introduced.