This is the motivation behind "silent bob", something we were talking about way back in 2002-2003.
Ian. On Wed, Apr 4, 2012 at 2:19 PM, Matthew Toseland <toad at amphibian.dyndns.org>wrote: > > http://www.v3.co.uk/v3-uk/news/2165733/swedish-researchers-uncover-key-chinas-tor-blocking > > Looks like they look for a header that looks like a connection to a > bridge, then try to do a handshake. This is surprisingly sophisticated - I > had expected they just created thousands of gmail accounts and harvested > all the bridges by email. > > Also, they appear to be able to create unidentifiable IP addresses on > demand, meaning that the opennet protection schemes based on IP scarcity > are not going to work. > > This won't work as-is with Freenet because Freenet doesn't do handshakes > unless you have the keys. However there may be (more complicated) ways to > identify the traffic, and the above implies they may be sophisticated > enough to implement them. It does mean that obfuscation (stego) is > increasingly important. > > _______________________________________________ > Tech mailing list > Tech at freenetproject.org > https://emu.freenetproject.org/cgi-bin/mailman/listinfo/tech > -- Ian Clarke Founder, The Freenet Project Email: ian at freenetproject.org -------------- next part -------------- An HTML attachment was scrubbed... URL: <https://emu.freenetproject.org/pipermail/tech/attachments/20120404/a485deeb/attachment.html>
