You seem to be missing an important point about foiling traffic analysis. It is essentially the same problem as the covert channel problem and its solution has the same challenges - it consumes a great in the way of resources. In order to eliminate traffic analysis, you essentially have to always use the full bandwidth available (although you can have pseudo-random burst behaviors). This in turn means that instead of gaining the low cost resulting from sharing bandwidth, you end up having far more utilization and (depending on what portion of the world does this) increasing the price of the resource. So it costs a lot more and uses a great deal of bandwidth. -> See: Info-Sec Heaven at URL http://all.net/ Management Analytics - 216-686-0090 - PO Box 1480, Hudson, OH 44236