I believe that with the I2P and TOR integration this project is getting close to providing some sort of anonymous behavior. Still, I am not totally convinced what the degree of security it may provide at the moment. Anyone can comment on this? Is there some scientific evidence of the fact that user behavior is sufficiently disguised?
A network protocol analyzer.
A tool that renames, moves, and copies files using an expression.