Conclusions Difficult to strike a balance between security and usability Perfect resistance to traffic analysis requires complete uniformity detectable entropy (size changes due to compression, etc.) timing directionality