Hmmm... maybe that's why my SSH connections from home always constantly get expectantly shutdown.
Maybe people should be hiding things out in the open. Like, make it look like normal (unencrypted) HTTP, SMTP, or POP3 traffic (or something pretty common like those)... and hide the data in the data stream. For instance... make it look like an image is being downloaded... and hide data in there... etc. See ya On 9/19/07, Roop Mukherjee <[EMAIL PROTECTED]> wrote: > > Apparently ISPs are degrading service to p2p traffic and everything > encrypted for their users. > http://it.slashdot.org/article.pl?sid=07/04/07/1755230 > > 1. Does anyone know what packet inspection algorithms are being used for > ISPs for finding p2p traffic? Given the variety of p2p protocols in use > and the frequency at which they change I would guess that a port based or > bit > pattern based filers would not be totally effective. > 2. Are their ways that p2p data that uses ssh can be distinguished from > say an e-commerce transaction by an ISP? > > -- Roop > _______________________________________________ > p2p-hackers mailing list > [email protected] > http://lists.zooko.com/mailman/listinfo/p2p-hackers > -- Charles Iliya Krempeaux, B.Sc. <http://ChangeLog.ca/> Vlog Razor... Vlogging News http://vlograzor.com/
_______________________________________________ p2p-hackers mailing list [email protected] http://lists.zooko.com/mailman/listinfo/p2p-hackers
