Charles Iliya Krempeaux wrote: > Maybe people should be hiding things out in the open. Like, make it > look like normal (unencrypted) HTTP, SMTP, or POP3 traffic (or something > pretty common like those)... and hide the data in the data stream.
It would be interesting to know how they're detecting encrypted traffic - measuring redundancy, as in the recent Skype paper, or just throttling anything that's not a recognised plaintext protocol? If the former, how much redundancy do you have to add to get round the filter? If the latter, can you just tack "GET / HTTP/1.0" to the beginning of every connection? Cheers, Michael _______________________________________________ p2p-hackers mailing list [email protected] http://lists.zooko.com/mailman/listinfo/p2p-hackers
