On Wednesday, 20. May 2009 18:14:53 Matthew Toseland wrote:
> Depends on your threat model. Freenet traffic clearly doesn't look like
> these without proper stego transport plugins, and the connections between
> nodes definitely don't look like them, unless what you are imitating is
> purely peer to peer, in which case you need to look at the other nodes'
> connections as well and/or the timing. 

Is a steganography transport plugin planned? 

The option of going really deep into hiding is one of the ideas behind freenet 
which appealed to me the most. 

> Also, we can't use TCP at the
> moment.

That's why I searched for services which also use UDP. 

Else the list would have been far longer... :) 

Best wishes, 
Arne

--- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- 
   - singing a part of the history of free software -
              http://infinite-hands.draketo.de
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 198 bytes
Desc: This is a digitally signed message part.
URL: 
<https://emu.freenetproject.org/pipermail/devl/attachments/20090520/d198719d/attachment.pgp>

Reply via email to