Experimental website traffic fingerprinting defense
For grins, I decided to make an experimental fingerprinting defense to defend against http://lorre.uni.lu/~andriy/papers/acmccs-wpes11-fingerprinting.pdf.
Basically the defense is to enable HTTP pipelining and to randomize the size and the order of the pipeline queue for each connection. It's easy to do and doesn't cost us any overhead.
I think we should ask the researchers to test it out for us or give us their source code.