let's say you have a scanner connected to three node
1. Sentry (using obfuscated connection)
2. Black Ice (using normal connection)
3. Turret (using normal connection)
the attacker will see your scanner connected to Sentry, Black Ice, and Turret, and probably thinking he/she can disable your sentry just by using access on your scanner and then using wraith on your sentry
but.. the moment he/she installed an access to the scanner.. the truth will appear, that your scanner only connected to Black Ice and Turret
thus.. forcing the attacker to change his/her plan on-the-go
so basically this 'obfuscated connection' will still consume your connection slot on a node, but only reveal the truth when the attacker gain access to your node (by installing access or taking over the node using brute force)
also there will be a limit on how much you can use an 'obfuscated connection' depending on your core level.
so how do you guys think about it?