I recently posted to the Tor forum asking for clarification about a Mike Perry blog post concerning traffic analysis mitigations. Machine Learning makes this attack vector increasingly problematic.
Excerpt:
for users comfortable with the CLI, maybe a script exists designed for this, using torsocks?
A script would have the benefit that it could be run by default on anonymity focused distributions like Tails and Whonix, so users would be protected without requiring specific behavior from them.
Is this something that has been considered before by the Whonix devs?
In my view, a default process that created randomized Tor traffic would be a great feature for Whonix. I think this would ideally be implemented with several properties:
- uses a source of entropy for randomization, so that it cannot be fingerprinted (such as how key generation uses entropy)
- can be toggled on and off, though is on by default
- generates enough Tor traffic to serve it’s use, but not so much that it significantly clogs the Tor network