Extent of UK snooping revealed

ken bbrow07 at students.bbk.ac.uk
Wed May 28 06:59:07 PDT 2003


John Kozubik wrote:

> I am writing a HOWTO on this subject now, and will (perhaps) be speaking
> on the topic at DefCon.  Long story short:

> a) collocate your own server (not just a webhost) somewhere.

[...]

> d) set up an automated script on the server that _constantly_ fetches
> random web pages, thus creating a constant stream of http traffic in and
> out of the server, again diminishing traffic patterns.  Log the actual
> proxy requests in some temporary fashion and randomly hit those web sites
> in an automated fashion throughout the day, regardless of whether someone
> is requesting them through the proxy or not...and then, script a constant
> stream of requests to the proxy as well 

> Comments appreciated.

Fun & difficult part is setting up fetching of "random" web pages 
that looks like real user activity.

Also, unless you have some very odd friends, user activity will 
vary in statistically likely ways over time, so the ideal system 
would "randomly" compensate for that.





More information about the cypherpunks-legacy mailing list