The graphs in [1] and [2] are IMO good examples related to [3]:
"... in addition to network filtering, the (currently) sharp input signal ... is transformed into a smeared output response ... This shall make it harder for an attacker to gather infromation using time correlation techniques."
Feedback is welcome.
[1] https://github.com/toralf/torutils/blob/main/doc/network-metric.svg [2] https://github.com/toralf/torutils/blob/main/doc/network-metric-nextday.svg [3] https://github.com/toralf/torutils/tree/main#block-ddos-traffic
tor-relays@lists.torproject.org