ok so no it's not a coincidence but it's a separate mechanism entirely
https://circumstances.run/@hipsterelectron/116269867302883821
the analogy my brain was making was "impersonation" => deanonymization, which is not a thing
random state is both consumed and constructed in the process of constant-bandwidth noise generation
"state exposure" was another mistake. i don't really know that the constant-bandwidth noise is an obvious target for attack, given that we can construct the interface which describes a baud rate and then sends bytes we like while filling the rest with noise and avoids timing variations. this doesn't seem problematic but it wouldn't be something exposed directly to like the cpu or threading or whatever. this is solvable and someone else i'm sure has considered this
the "state exposure" i was thinking of was the state of message progress that links message source to sink i.e. alice to bob, s to t, me to you
i think that's not the attack that would be relevant but rather identifying the variants of message channel used between neighboring peers, and from there inferring types of messages
so that does make constant-bandwidth noise the target for attack. which is good because i didn't know where that term was going and it seems like an eminently solvable problem
i think source onion routing with progress notifications and route status seems pretty solid with the right choice of responses