This is the motivation behind "silent bob", something we were talking about
way back in 2002-2003.

Ian.

On Wed, Apr 4, 2012 at 2:19 PM, Matthew Toseland
<toad at amphibian.dyndns.org>wrote:

>
> http://www.v3.co.uk/v3-uk/news/2165733/swedish-researchers-uncover-key-chinas-tor-blocking
>
> Looks like they look for a header that looks like a connection to a
> bridge, then try to do a handshake. This is surprisingly sophisticated - I
> had expected they just created thousands of gmail accounts and harvested
> all the bridges by email.
>
> Also, they appear to be able to create unidentifiable IP addresses on
> demand, meaning that the opennet protection schemes based on IP scarcity
> are not going to work.
>
> This won't work as-is with Freenet because Freenet doesn't do handshakes
> unless you have the keys. However there may be (more complicated) ways to
> identify the traffic, and the above implies they may be sophisticated
> enough to implement them. It does mean that obfuscation (stego) is
> increasingly important.
>
> _______________________________________________
> Tech mailing list
> Tech at freenetproject.org
> https://emu.freenetproject.org/cgi-bin/mailman/listinfo/tech
>



-- 
Ian Clarke
Founder, The Freenet Project
Email: ian at freenetproject.org
-------------- next part --------------
An HTML attachment was scrubbed...
URL: 
<https://emu.freenetproject.org/pipermail/tech/attachments/20120404/a485deeb/attachment.html>

Reply via email to