
Some people say to track tor users there is a tool named raptor. It uses the packet data recognition to track via AS the data streams between tor hosts. Can be a good idea to split, merge, change the packet order, the data streams etc... to obfuscate the traffic with an algotithm to create false data recostruction? Example: Alice --->node-> node -> node --> Bob1 ----> False/EndOfStream ^ ^v ^v ^v ^v | \------- node <- node <- node <-- node ---------/ If a complex network is created and some random data and connection are added to negotiate the data obfuscation, is very difficult to track a single data stream or packet. When the data arrival, send some data (same payload size)to a random loop circuit. What do you think?