Here's the website for Slitheen (the project described in the article): <a href="https://crysp.uwaterloo.ca/software/slitheen/" rel="nofollow">https://crysp.uwaterloo.ca/software/slitheen/</a>
This is an interesting idea, but it depends on Decoy Routing.<p>Decoy routing (in the sense of expecting someone to let State (== NSA) run some code on their biggest backbone routers) seems basically unworkable -- both technically and politically. I don't understand why anyone pushes it, except for people trying to find an excuse to give USG access to their backbone under some pretense.<p>You could deploy this in a more workable "domain fronting" model, vs. the decoy routing model, though. In that case, especially if the sites are user generated content sites, you wouldn't need the active cooperation of anyone -- neither site operator nor backbone network operator.
Direct link to Slitheen research paper with diagrams - <a href="https://crysp.uwaterloo.ca/software/slitheen/slitheen-paper.pdf" rel="nofollow">https://crysp.uwaterloo.ca/software/slitheen/slitheen-paper....</a>