On Wednesday, 20. May 2009 18:14:53 Matthew Toseland wrote:
> Depends on your threat model. Freenet traffic clearly doesn't look like
> these without proper stego transport plugins, and the connections between
> nodes definitely don't look like them, unless what you are imitating is
> purely peer to peer, in which case you need to look at the other nodes'
> connections as well and/or the timing.
Is a steganography transport plugin planned?
The option of going really deep into hiding is one of the ideas behind freenet
which appealed to me the most.
> Also, we can't use TCP at the
> moment.
That's why I searched for services which also use UDP.
Else the list would have been far longer... :)
Best wishes,
Arne
--- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- ---
- singing a part of the history of free software -
http://infinite-hands.draketo.de
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 198 bytes
Desc: This is a digitally signed message part.
URL:
<https://emu.freenetproject.org/pipermail/devl/attachments/20090520/d198719d/attachment.pgp>