Hacker News new | past | comments | ask | show | jobs | submit login

If you are repeatedly going to sites A,B,C, then over time even if you are sending bogus packets, the sites you do go to will rise to the top.

It’s similar to differential privacy where even with a bunch of bogus data patterns in aggregate can be determined.




It's not one of encryption or tunneling or packet shaping that does the work, but rather all of these techniques together work to reduce an adversary's traffic analysis capability.




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: