<html>
<head>
<meta content="text/html; charset=windows-1252"
http-equiv="Content-Type">
</head>
<body bgcolor="#FFFFFF" text="#000000">
<p><br>
</p>
<br>
<div class="moz-cite-prefix">On 4/20/2017 12:36 PM, hbaker1 wrote:<br>
</div>
<blockquote
cite="mid:26793012.17274.1492717016356@mswamui-chipeau.atl.sa.earthlink.net"
type="cite">
<style type="text/css"><!-- DIV {margin:0px;} --></style>
<div style="font-size: 13px;color: rgb(0, 0, 0);font-family:
arial,sans-serif;">If one needs a synthetic internet traffic
generator in order to protect against traffic analysis, how does
one tell the difference from an ad scamming scheme?<br>
</div>
</blockquote>
"Protect against traffic analysis" is a rather vague specification.
What is your threat model, exactly?<br>
<br>
There are some threats that are mitigated by cover traffic, but many
others are not. For example, if your goal is to mask your visits to
"<a class="moz-txt-link-abbreviated" href="http://www.questionable-chocolate.xxx">www.questionable-chocolate.xxx</a>", your generating cover traffic
won't help. The needle will still be somewhere in the bigger
haystack.<br>
<br>
Of course, one way to protect against the threat is to have lots of
cover traffic generated by *other people*. They will do random loads
of "<a class="moz-txt-link-abbreviated" href="http://www.questionable-chocolate.xxx">www.questionable-chocolate.xxx</a>", and in a quid pro quo you will
do random loads of "<a class="moz-txt-link-abbreviated" href="http://www.furry-mammals-playing.org">www.furry-mammals-playing.org</a>". The hope would
be that the censors would be befuddled, and won't know who is
loading this or that site for real or as a cover. It would be a
variation of "safety in numbers". But it will only work if there is
a big enough number of people playing that game.<br>
<br>
-- Christian Huitema<br>
</body>
</html>