Obfuscated TCP is a backwards-compatible modification to the TCP protocol which adds opportunistic encryption. It's designed to hamper and detect large-scale wiretapping and corruption of TCP traffic on the Internet [1]
TLS is the solution to protecting sensitive information. However, there's room for a low setup cost protocol to protect the bulk of traffic which isn't currently encrypted. It can't stop a focused attack, but it can assuage untargeted, dragnet sniffing of backbones and spoofing of RST packets. I figure that Tor users might be the kind of technically inclined folks who might want to help out by testing this even though I've not written any Tor code in quite a while. Note that, since obstcp has a kernel component, you'd need to be able to patch and rebuild a kernel. All the information is at: http://code.google.com/p/obstcp/wiki/Testing Also, I'll be on #obstcp on OFTC today Cheers, [1] http://code.google.com/p/obstcp/ -- Adam Langley [EMAIL PROTECTED] http://www.imperialviolet.org