The Solution
Obfuscated traffic. I read on here a few weeks past, and forget the title of the browser being worked on, but the gist of it was that it hid the real site you try to visit by surrounding your real traffic with traffic to innocuous sites. I think this is for getting around great firewalls and the like. Sorry about the browser name, and exact details, but hopefully it will see the light of day, and we can all browse the web in peace, spewing extra obfuscation traffic at our ISP's monitors. You can do this at home with your own traffic shaping tools. I would suspect that it would be trivial to cobble together a giant list of "extra sites" that get randomly injected as traffic along side your real traffic. And you wouldn't need to route it all through your "obfuscator" device, it can do traffic injections anywhere behind your NAT in concert with your real devices. Anyway, something fun to craft in Python with an exrta rPi3. It WILL slow your connection down a bit, but who cares, let's work together to make ISP marketing data extra shitty. :P
ATH+++