Given a threat model covering passive attacks and general surveillance capitalism (including ISP snooping), I’ve been thinking through the risks associated with exposing an ISP IP that I connect to via VPN.
I have a home lab server hosting a variety of self hosted services I use. I have an always-on connection to this server IP over VPN from my mobile phone. I use this for notifications, location tracking, etc, so it’s important to me that it’s always on. All my internet traffic is also routed through this server and exits through a public VPN provider. I’m wondering how concerned I should be by the fact that I’m the only one connecting to this IP and therefore very identifiable on public wifi. I’m thinking:
-
Anytime I connect to public wifi, I could be profiled because my traffic pattern is so consistent and I’m the only one that ever connects to that IP. (in general, I have traditionally favored wifi connectivity for my mobile phones and often run in airplane mode)
-
My home ISP will see my source IP when I’m traveling and can derive my location from this IP anytime I’m connected to wifi outside my house.
I believe I can solve this on my laptop by tunneling my home VPN through a public VPN service but my understanding is that tunneling VPNs is not possible on Android/GrapheneOS.
Is this a threat vector I should be worried about for general anti-surveillance capitalism?How comfortable are you exposing your dedicated VPN IPs to all of the public wifi points you connect to?