Governments around the world love “metadata” and want to collect it, which is generally interpreted to mean ubiquitous no-opt-out eavesdropping on the internet at large.
So, what could somebody learn by capturing the metadata from my home broadband? What are my browsing habits? Which servers, in which countries, am I hitting? Which of my devices and applications are phoning home without my knowledge? Was my home network compromised by outside attackers?
I wanted to find out, and the answers are on the wire. So I set up a computer to perform transparent packet capturing and logging of the data found in IP and cleartext HTTP headers. The machine is consumer-grade, running Debian with two bridged Ethernet interfaces, and a reasonably simple program written in Go with the gopacket/pcap library, logging to a timeseries database.
This talk will be about both the technical setup of such a device, why you might want to do this to debug networking problems, and the things I learned by doing this to myself for a few months.
Dr Josh Deprez works as a site reliability engineer at Google in Australia. While finishing his PhD in abstract mathematics, he worked in corporate IT Microsoft-land, did subcontracting on iPhone and iPad apps, and had an internship with Google’s information security team. He’s a bit crazy, especially when made to write about himself in the third person.
©2015, O'Reilly Media, Inc. • (800) 889-8969 or (707) 827-7019 • Monday-Friday 7:30am-5pm PT • All trademarks and registered trademarks appearing on oreilly.com are the property of their respective owners. • firstname.lastname@example.org