Skip to content

Commit 7a7ca45

Browse files
committed
packet change
1 parent d26e796 commit 7a7ca45

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

cmb2.ipynb

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@
6060
"\n",
6161
"## Device Mapping\n",
6262
"\n",
63-
"To map the recorded data packages to our devices we noted down which IP address is used by which device. Thus, we can group the traffic per device and analyse the different behavior of the used clients.\n",
63+
"To map the recorded data packets to our devices we noted down which IP address is used by which device. Thus, we can group the traffic per device and analyse the different behavior of the used clients.\n",
6464
"\n",
6565
"The following table shows the mapping of IP addresses to devices:\n",
6666
"\n",
@@ -632,7 +632,7 @@
632632
"\n",
633633
"Next, we want to investigate the encryption of our data. To compute the percentage of encrypted traffic, we base our analysis solely on the used protocols. The reason behind this is that we are not saving the data content of each frame in our .csv-file. \n",
634634
"\n",
635-
"To distinguish between packages with encrypted content and packages with non-encrypted content, we will only look at the following application layer protocols:\n",
635+
"To distinguish between packets with encrypted content and packets with non-encrypted content, we will only look at the following application layer protocols:\n",
636636
"- Encrypted:\n",
637637
" - DTLSv1.2\n",
638638
" - ISAKMP\n",
@@ -692,7 +692,7 @@
692692
"cell_type": "markdown",
693693
"metadata": {},
694694
"source": [
695-
"By inspecting the plot it can quickly be seen that the encrypted traffic takes up the majority of our captured traffic. Only 1.5% of all packages are unencrypted. These mainly include DNS requests."
695+
"By inspecting the plot it can quickly be seen that the encrypted traffic takes up the majority of our captured traffic. Only 1.5% of all packets are unencrypted. These mainly include DNS requests."
696696
]
697697
},
698698
{
@@ -1270,7 +1270,7 @@
12701270
"source": [
12711271
"The only device that is contacting SWM is our ESP32 Microcontroller. This Microcontroller is used to display live subway departure times on a small display. Hence, it makes sense that it would regularly contact SWM Services GmbH to get the data from their server.\n",
12721272
"\n",
1273-
"However, there seems to be something misconfigured with the number of requests. Printing out the timestamps of each sent and received data frame shows us that we have around 25 packets within 10 seconds sent from and to SWM. During our 5-day data capture, this summed up to a total of 1057066 packages of data. \n",
1273+
"However, there seems to be something misconfigured with the number of requests. Printing out the timestamps of each sent and received data frame shows us that we have around 25 packets within 10 seconds sent from and to SWM. During our 5-day data capture, this summed up to a total of 1057066 packets of data. \n",
12741274
"\n",
12751275
"This device is running 24/7 for several years now. We are quite sure that SWM did not implement a rate limit on their public API endpoint. Otherwise, this horrendous API spamming would've not been possible."
12761276
]
@@ -1312,7 +1312,7 @@
13121312
"source": [
13131313
"### Roborock Vacuum Robot\n",
13141314
"\n",
1315-
"Xiaomi (and other Chinese manufacturers) are often in the critic to violate user privacy. Therefore, we wanted to have a closer look at the traffic of the `Roborock S5 Max` smart vacuum cleaner and the companion app sent. We focused on the locations the packages are sent to. Roborock is saying that their devices are GDPR compliant and all EU data is stored in a german server center."
1315+
"Xiaomi (and other Chinese manufacturers) are often in the critic to violate user privacy. Therefore, we wanted to have a closer look at the traffic of the `Roborock S5 Max` smart vacuum cleaner and the companion app sent. We focused on the locations the packets are sent to. Roborock is saying that their devices are GDPR compliant and all EU data is stored in a german server center."
13161316
]
13171317
},
13181318
{
@@ -1350,7 +1350,7 @@
13501350
"cell_type": "markdown",
13511351
"metadata": {},
13521352
"source": [
1353-
"To our disappointment (or luck) the data is sent to the Amazon Server located in Frankfurt and therefore is indeed GDPR compliant. However, we cannot say what happens with the data after being processed by the Amazon servers and therefore can not assure data privacy. That's why we wanted to have another look using a so-called [Mitmproxy](https://mitmproxy.org). With this tool, we can even take a look into encrypted packages which are sent and received by the companion app."
1353+
"To our disappointment (or luck) the data is sent to the Amazon Server located in Frankfurt and therefore is indeed GDPR compliant. However, we cannot say what happens with the data after being processed by the Amazon servers and therefore can not assure data privacy. That's why we wanted to have another look using a so-called [Mitmproxy](https://mitmproxy.org). With this tool, we can even take a look into encrypted packets which are sent and received by the companion app."
13541354
]
13551355
},
13561356
{
@@ -1447,7 +1447,7 @@
14471447
"\n",
14481448
"It was also very fascinating what daily habits can be read out of the network traffic, even if most of it is already encrypted. By looking closer at single devices, their whole browsing behavior could easily be tracked. This gives a lot of insights into the analysis possibilities of ISP's and what huge user foodprints can be collected by them.\n",
14491449
"\n",
1450-
"This network analysis helped us a lot in deepening our knowledge about the architecture of the web. We learned deeper facts about new network protocols and the amount and distribution of the packages sent by our different devices.\n",
1450+
"This network analysis helped us a lot in deepening our knowledge about the architecture of the web. We learned deeper facts about new network protocols and the amount and distribution of the packets sent by our different devices.\n",
14511451
"\n",
14521452
"All in all, this project gave great insights into network technology and the data flow of our daily habits."
14531453
]

0 commit comments

Comments
 (0)