Charles Iliya Krempeaux wrote:
> Maybe people should be hiding things out in the open.  Like, make it
> look like normal (unencrypted) HTTP, SMTP, or POP3 traffic (or something
> pretty common like those)... and hide the data in the data stream.

It would be interesting to know how they're detecting encrypted traffic
- measuring redundancy, as in the recent Skype paper, or just throttling
anything that's not a recognised plaintext protocol? If the former, how
much redundancy do you have to add to get round the filter? If the
latter, can you just tack "GET / HTTP/1.0" to the beginning of every
connection?

Cheers,
Michael
_______________________________________________
p2p-hackers mailing list
[email protected]
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Reply via email to