This is how DAITA works: |
1. Constant Packet Sizes |
The size of network packets can be particularly revealing, especially small packets, so DAITA makes all packets sent over the VPN the same constant size. |
2. Random Background Traffic |
By unpredictably interspersing dummy packets into the traffic, DAITA masks the routine signals to and from your device. This makes it harder for observers to distinguish between meaningful activity and background noise. |
3. Data Pattern Distortion |
When visiting websites (or doing any other activity that causes significant traffic), DAITA modifies the traffic pattern by unpredictably sending cover traffic in both directions between client and VPN server. This distorts the recognizable pattern of a website visit, resisting accurate identification of the site. |
Reference: |
https://mullvad.net/en/blog/introducing-defense-against-ai-guided-traffic-analysis-daita |
Have you installed linux yet? If you have follow these instructions to install mullvad: |
https://mullvad.net/en/help/install-mullvad-app-linux |
If you haven't installed linux yet here's a simple walkthrough: |
https://linuxsimply.com/linux-basics/os-installation/single-os/debian/ |
Once you've installed linux and mullvad-vpn select wireguard and turn on DAITA. |
If you're using the command line you'll need a list of servers supporting DAITA: |
https://pulls.name/blog/2024-06-05-eval-first-daita-servers/ |
Here are some examples of using mullvads CLI: |
mullvad relay set tunnel wireguard --use-multihop on
mullvad relay set location ch-zrh-wg-004
mullvad relay set tunnel wireguard entry location nl-ams-wg-103
mullvad tunnel set wireguard --daita on
mullvad obfuscation set mode udp2tcp |
Here is an extensive but incomplete list of mullvad commands: |
https://mullvad.net/en/help/how-use-mullvad-cli |