Extent of UK snooping revealed

John Kozubik john at kozubik.com
Wed May 28 10:36:23 PDT 2003


On Wed, 28 May 2003, ken wrote:

> John Kozubik wrote:
>
> > d) set up an automated script on the server that _constantly_ fetches
> > random web pages, thus creating a constant stream of http traffic in and
> > out of the server, again diminishing traffic patterns.  Log the actual
> > proxy requests in some temporary fashion and randomly hit those web sites
> > in an automated fashion throughout the day, regardless of whether someone
> > is requesting them through the proxy or not...and then, script a constant
> > stream of requests to the proxy as well
>
> Fun & difficult part is setting up fetching of "random" web pages
> that looks like real user activity.

Yes, this is a somewhat interesting problem - probably not that difficult
considering that the goal here is to create plausible deniability in a
setting like a court of law.  Generating traffic patterns that convince
other crytpographers (or even sysadmins) is much harder than generating
traffic patterns that simply create reasonable doubt.

> Also, unless you have some very odd friends, user activity will
> vary in statistically likely ways over time, so the ideal system
> would "randomly" compensate for that.

Exactly.  The ideal system would monitor in and outbound:

- web requests
- bytes transferred
- bytes per page
- pictures per page
- binary files transferred
- (all of those) / second

and generate pseudo-random browsing to smooth these variables over time.
Perhaps a script that chose random word pairs from the dictionary, googled
them, and browsed the pages that were returned would be a good platform.

-----
John Kozubik - john at kozubik.com - http://www.kozubik.com





More information about the cypherpunks-legacy mailing list