You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This one is mostly inspired by Tor's Snowflake https://snowflake.torproject.org I also have a user who is running Wireguard over Datachannel.
They then access things via VPN over Datachannel in the browser.
The biggest thing I have seen is developers finding ways to make traffic less fingerprintable. This might be an implementation detail, but maybe we can make some of these things configurable or move away from them.
Information from ICE (uFrag/uPwd can help identify how many unique sessions behind a NAT)
Information from DTLS handshake (ClientHello/ServerHello members, self signed certificate attributes)
Can we provide APIs that allow users to fight against these things?
The text was updated successfully, but these errors were encountered:
This one is mostly inspired by Tor's Snowflake https://snowflake.torproject.org I also have a user who is running Wireguard over Datachannel.
They then access things via VPN over Datachannel in the browser.
The biggest thing I have seen is developers finding ways to make traffic less fingerprintable. This might be an implementation detail, but maybe we can make some of these things configurable or move away from them.
Can we provide APIs that allow users to fight against these things?
The text was updated successfully, but these errors were encountered: