- Google: generates a random search string, searches Google and clicks on a random result.
- Alexa: visits a website from the Alexa Top 1 Million list. (warning: contains a lot of porn websites)
- Twitter: generates a popular English name and visits their profile; performs random keyword searches
- DNS: produces random DNS queries from the Alexa Top 1 Million list.
- Spotify: random searches for Spotify artists
- Facebook Messenger
git clone https://github.com/eth0izzle/needl.git
pip3 install -r requirements.txt
- Download ChromeDriver for your platform (requires Chrome) and place in ./data.
Needl runs as a daemon and will happily sit in the background chomping away 24/7, 365. Each module (task) has scheduled actions, for example random DNS queries will happen every 1 to 3 minutes. You can configure the intervals within
usage: needl.py [-h] [--datadir DATADIR] [-d] [-v] [--logfile LOGFILE] [--pidfile PIDFILE] Take back your privacy. Lose yourself in the haystack. optional arguments: -h, --help show this help message and exit --datadir DATADIR Data directory -d, --daemon Run as a deamon -v, --verbose Increase logging --logfile LOGFILE Log to this file. Default is stdout. --pidfile PIDFILE Save process PID to this file. Default is /tmp/needl.pid. Only valid when running as a daemon.
- Why not just use a VPN/Tor? And you should! Needl does not protect your legitimate traffic in any way. It simply generates more.
- By using Needl will my legitimate traffic be hidden/protected/safe? No. This isn’t the goal of Needl. It’s purpose is to generate more traffic to make it harder to identify your legitimate traffic. There’s no evidence to suggest this actually works – it’s a proof of concept.
- Can [insert service here] differentiate between Needl and my legitimate requests? In theory, yes. [insert service here] can track you with Cookies, Session data or algorithms. Needl will tackle this in the future.
- Where are your tests?!? Submit a pull request. Please.