Some people say to track tor users there is a tool named raptor. It uses the packet data recognition to track via AS the data streams between tor hosts.
Can be a good idea to split, merge, change the packet order, the data streams etc... to obfuscate the traffic with an algotithm to create false data recostruction?
Example:
Alice --->node-> node -> node --> Bob1 ----> False/EndOfStream ^ ^v ^v ^v ^v | ------- node <- node <- node <-- node ---------/
If a complex network is created and some random data and connection are added to negotiate the data obfuscation, is very difficult to track a single data stream or packet.
When the data arrival, send some data (same payload size)to a random loop circuit.
What do you think?