Discovery Attacks Intent: reveal requester or responder Passive attacks to detect unusual browsing patterns (including request timing) HTTP requests/responses Defense: Innocuous browsing patterns, no modification to HTTP headers themselves Impersonation attacks censor establishes an Infranet responder and nails requesters Defense: separate forwarding and decoding of symbols