There is no way for the surveillance to be bypassed, the company says. The roll-out is planned in Germany.

  • ailiphiliaOP
    link
    fedilink
    arrow-up
    2
    ·
    2 years ago

    Tor doesn’t seem to help here if I got it right, because the data traffic is assigned to your phone number.

    • octt@feddit.it
      link
      fedilink
      arrow-up
      6
      ·
      edit-2
      2 years ago

      They can’t do much if you use any proxy, be it Tor, a public single-node proxy, or a commercial VPN (which I think is inadequate for an use like this, after all VPN providers are ISPs in a way, so you are just hiding traffic from your own ISP and giving it to another one).

      They could just see the traffic encrypted between proxy client and server, and maybe do some correlation with time of usage and stuff like that.

      If you have bad opsec, it’s possible to completely deanonymize you on Tor and track what you do, but it’s not easy and so it’s something that only law enforcement does. Entities with simple commercial interests don’t go above certain limits of complexity. Most websites for example use browser fingerprinting techniques, and as far as I know some stuff uses advanced user fingerprinting tactics (logging the unique way you move the mouse or type on the keyboad, like Google ReCaptcha 2 does), an ISP could do even less.