Also, an underutilized strategy is to enable your tor instance to be an internal relay.
If you also route internal traffic to tor, then /your/ traffic will become harder to identify from /other's/ traffic. That was the point of surfing while acting as a relay (Non-exit).
My day job is literally doing nothing but analyzing data (mostly bioinformatics) but without going to deep into it, it adds entropy (or noise) to the significant bits of data.
In my "secure" setups (as secure as my feeble mind allows me), I've set up artificial traffic scripts. All they do is simulate random browsing on random sites at random times regardless if i'm there or away from the set-up. That adds another uncertainty.
Would and adversary be able to classify it as /my/ traffic? /Theirs/? Or just auto-generated?
However all of it might be moot with this:
>>http://www.net-security.org/secworld.php?id=18092In which case I'd encourage you use an unlisted bridge using obfs3 (a way to obfuscate traffic; obfs3 has shown to be able to cross the the great Chinese firewall).
Post too long. Click here to view the full text.