this post was submitted on 15 May 2026
43 points (100.0% liked)

Privacy

48564 readers
196 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

much thanks to @gary_host_laptop for the logo design :)

founded 6 years ago
MODERATORS
 

Fauxx is an open-source Android privacy tool that poisons data broker and ad-tech profiles by generating continuous, plausible, off-demographic synthetic activity from your device. The goal is simple: make your real behavioral signal statistically indistinguishable from noise.

Not my project, but though this is really cool and worth sharing.

top 10 comments
sorted by: hot top controversial new old
[–] leoj@piefed.zip 4 points 2 hours ago (1 children)

I wonder if you could set up a second phone that is logged in with all your accounts, then use it for FAUXX, currently concerned about battery usage / background usage of device.

Like, does it need to be running continuously ALL DAY to effectively poison? Or is sometimes usage helpful? Second phone idea solid?

Anyone understand the data collection better have thoughts?

[–] adespoton@lemmy.ca 5 points 1 hour ago (1 children)

This method wouldn’t combat device fingerprinting, so it would be trivial for everyone but the aggregate data brokers to filter out as noise.

For a strategy like this to work, your legitimate traffic needs to be indistinguishable from the random traffic.

[–] leoj@piefed.zip 1 points 1 hour ago (1 children)

So basically it has to be running while you're using it, and on the device your primarily use?

[–] f3nyx@lemmy.ml 1 points 1 hour ago

not necessarily. if 'you' are sending traffic, i (someone interested in your data) don't really care where it comes from. Em is correct that it's trivial to filter out, but it's also another data point that is interesting and potentially relevant for them, so in practice they won't.

tracking has gotten to the point where they can infer connections based off of users that have no interaction but otherwise share a location for a period of time (think coffee shop wifi, work). you have things in common with those people. maybe not a lot, but enough to be relevant in someone's dataset somewhere.

so no, it doesn't have to be running on your primary device to be relevant. i'd argue that it simply being on your home network would be enough.

[–] Runecrush376@lemmy.world 6 points 2 hours ago

I just found this app on droidify, really cool idea. Id love to see something similar on Linux. (imnotsure if something like that already exists)

[–] sjkhgsi@lemmy.lynas.ca 1 points 1 hour ago

That's cool!

[–] crow@leminal.space 1 points 2 hours ago* (last edited 2 hours ago) (1 children)

Interesting, how useful is it if I'm always behind a VPN and browse privately (hardened browser, ad blocker, no-script, never logged in etc.)?

May be wrong but the way I see it it doesn't help me much?

[–] f3nyx@lemmy.ml 4 points 1 hour ago (1 children)

i only did a quick readthrough so my understanding of how it works is probably flawed. that said:

you could consider split-tunneling a browser outside of your normal stack for fauxx to pollute. that way your real activity remains as close to "ghost" as possible, and gives your device a fake fingerprint that will fool anyone not directly targeting you.

the reason I'd suggest doing it that way is that nobody's personal device hygiene is perfect. flooding with synthetic data is a great way to help conceal when you slip up.

[–] Mister_Hangman@lemmy.world 1 points 1 hour ago (1 children)

Go further. I’m listening like a regard trying to understand

[–] f3nyx@lemmy.ml 1 points 58 minutes ago

you're kind of giving me a blank slate to talk here so let me hit the biggest point that is tangential to this conversation.

the easiest point for me to make is that if, on your phone, you bought your SIM card (and attached phone number) with payment info that can be tracked to your bank and your real name, your location is compromised whenever that card is online. this is something that the vast majority of privacy enthusiasts either neglect due to lack of knowledge, or cannot afford to remove from their threat profile due to the pervasiveness of cell networks in day to day life.

The most recent example i can give of this being necessary to consider in your privacy posture: In the US, ICE is using this combination of personal information and compromised locations to focus their efforts in neighborhoods with a primarily minority population.