Is there something that can generate random Internet usage to make the real sites I go to a bit obfuscated?

I’m thinking something that runs on my server, and simply visits a random website. It probably shouldn’t actually be random, and some sort of tweaking would be great. Like the ability to have it visit every news site there is. That way the ISP will have a harder time telling my political bias.

The threat model for this is below using a VPN for normal usage, although getting a dedicated VPN IP address is a project for one day.

  • Imprint9816@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    0
    ·
    edit-2
    7 months ago

    It would be a lot easier to just use a vpn and hide your traffic from your ISP that way.

    If your threat model doesn’t even need a vpn you are probably wasting your time anyway. HTTPS + a decent anti-fingerprinting browser (Mullvad, or Brave) is probably sufficient.

    • Dust0741@lemmy.worldOP
      link
      fedilink
      arrow-up
      0
      ·
      7 months ago

      As I mentioned I have a server, and I use a VPN to connect always to it. This makes using a paid VPN a bit harder. The dedicated VPN IP should fix this issue but I haven’t looked into how difficult that’d be.

      • Imprint9816@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        0
        ·
        7 months ago

        Ahh i see.

        Yeah it really slims down your VPN choices as having an IP address associated with your account makes it much more identifiable.

        It also usually costs more. The one I know offers a static IP is express VPN and ive heard Proton has plans on offering it.

        • Dust0741@lemmy.worldOP
          link
          fedilink
          arrow-up
          0
          ·
          7 months ago

          Yup. Tailscale+Mullvad isn’t a bad option, but I’d rather not depend on tailscale and a true local connection will always be better. But then you have to pay through tailscale and then more identifiable.