I am about to create a PR based on below information, please tell if relevant info is missing.
The FAQ mentions padding at two locations and needs to be updated:
You should split each connection over many paths.
You should send padding so it's more secure.
The blog post mentions:
"As part of the security discussion, we talked about the new padding defenses that were recently added to Tor and provide cover to Tor circuits against traffic analysis. We made plans for future padding techniques and defenses."
A comment clarifies:
Trying to summarize ticket #16861 (moved) linked in the blog:
Now tor "sends padding on a client's Tor connection bidirectionally at a random interval that we can control from the consensus, with a default of 4s-14s."
"padding approaches, with the goal of stymying some of the potential traffic analysis attacks out there -- website fingerprinting, end-to-end correlation, and the things in between. Padding between the guard and the client is especially appealing because a) it looks like it can provide pretty good mileage, and also b) I expect that we'd have an easier time raising more capacity at guards (compared to exits) if we publicize the reason why we need it." (comment:6:ticket:16861)
send at least one cell on a connection every 15s
the netflow defense only sends padding if the connection is idle
I stopped digging deeper but it might be enough to add this to the faq.