Thanks for helping them. The more sources that are sending the less likely that they will nail someone from the volume of ip traffic. If some of it is simply music downloads or uploads it will mask the real important data.
If I were trying to locate someone that was a threat, I would look at the high traffic ip addresses first. I am sure they have records of physical locations of ip addresses.
You can also put text messages inside images. These can be extracted on the other end by opening it with an editor. If that data is first encripted, then that is another level of security.
Of course none of this will help if video’s or pics are what you are sending. I am sure there is a way to encrypt it, but I do not know how.
Pray for the brave Persian soles who are doing this.
I just remote controlled my machine from the summer house in the upper penninsula of michigan and so far everything's still running fine.