Fauxx is an open-source Android privacy tool that poisons data broker and ad-tech profiles by generating continuous, plausible, off-demographic synthetic activity from your device. The goal is simple: make your real behavioral signal statistically indistinguishable from noise.

Not my project, but though this is really cool and worth sharing.

  • crow@leminal.space
    link
    fedilink
    arrow-up
    3
    arrow-down
    1
    ·
    edit-2
    6 hours ago

    Interesting, how useful is it if I’m always behind a VPN and browse privately (hardened browser, ad blocker, no-script, never logged in etc.)?

    May be wrong but the way I see it it doesn’t help me much?

    • f3nyx@lemmy.ml
      link
      fedilink
      arrow-up
      6
      ·
      5 hours ago

      i only did a quick readthrough so my understanding of how it works is probably flawed. that said:

      you could consider split-tunneling a browser outside of your normal stack for fauxx to pollute. that way your real activity remains as close to “ghost” as possible, and gives your device a fake fingerprint that will fool anyone not directly targeting you.

      the reason I’d suggest doing it that way is that nobody’s personal device hygiene is perfect. flooding with synthetic data is a great way to help conceal when you slip up.

        • f3nyx@lemmy.ml
          link
          fedilink
          arrow-up
          4
          ·
          4 hours ago

          you’re kind of giving me a blank slate to talk here so let me hit the biggest point that is tangential to this conversation.

          the easiest point for me to make is that if, on your phone, you bought your SIM card (and attached phone number) with payment info that can be tracked to your bank and your real name, your location is compromised whenever that card is online. this is something that the vast majority of privacy enthusiasts either neglect due to lack of knowledge, or cannot afford to remove from their threat profile due to the pervasiveness of cell networks in day to day life.

          The most recent example i can give of this being necessary to consider in your privacy posture: In the US, ICE is using this combination of personal information and compromised locations to focus their efforts in neighborhoods with a primarily minority population.

          • rhythmisaprancer@quokk.au
            link
            fedilink
            English
            arrow-up
            1
            ·
            22 minutes ago

            whenever that card is online

            Do you mean when the card is an active card viable for use? Or stored in the phone somehow? I’m curious what online means and if I am doing it… I don’t have any payments connected to a mobile phone but I do have a SIM card, probably paid for with a now expired card.