Take back your privacy. Lose yourself in the haystack.
Your ISP is most likely tracking your browsing habits and selling them to marketing agencies (albeit anonymised). Or worse, making your browsing history available to law enforcement at the hint of a Subpoena. Needl will generate random Internet traffic in an attempt to conceal your legitimate traffic, essentially making your data the Needle in the haystack and thus harder to find. The goal is to make it harder for your ISP, government, etc to track your browsing history and habits.
It’s not perfect. But it’s a start. Have an idea? Get involved!
- Google: generates a random search string, searches Google and clicks on a random result.
- Alexa: visits a website from the Alexa Top 1 Million list. (warning: contains a lot of porn websites)
- Twitter: generates a popular English name and visits their profile; performs random keyword searches
- DNS: produces random DNS queries from the Alexa Top 1 Million list.
- Spotify: random searches for Spotify artists
- Facebook Messenger
Needl should work pretty much any Linux system with Python 3.0+ installed.
git clone https://github.com/eth0izzle/needl.git
pip3 install -r requirements.txt
- Download ChromeDriver for your platform (requires Chrome) and place in ./data.
Needl runs as a daemon and will happily sit in the background chomping away 24/7, 365. Each module (task) has scheduled actions, for example random DNS queries will happen every 1 to 3 minutes. You can configure the intervals within
usage: needl.py [-h] [--datadir DATADIR] [-d] [-v] [--logfile LOGFILE] [--pidfile PIDFILE] Take back your privacy. Lose yourself in the haystack. optional arguments: -h, --help show this help message and exit --datadir DATADIR Data directory -d, --daemon Run as a deamon -v, --verbose Increase logging --logfile LOGFILE Log to this file. Default is stdout. --pidfile PIDFILE Save process PID to this file. Default is /tmp/needl.pid. Only valid when running as a daemon.