http://www.v3.co.uk/v3-uk/news/2165733/swedish-researchers-uncover-key-chinas-tor-blocking

Looks like they look for a header that looks like a connection to a bridge, 
then try to do a handshake. This is surprisingly sophisticated - I had expected 
they just created thousands of gmail accounts and harvested all the bridges by 
email.

Also, they appear to be able to create unidentifiable IP addresses on demand, 
meaning that the opennet protection schemes based on IP scarcity are not going 
to work.

This won't work as-is with Freenet because Freenet doesn't do handshakes unless 
you have the keys. However there may be (more complicated) ways to identify the 
traffic, and the above implies they may be sophisticated enough to implement 
them. It does mean that obfuscation (stego) is increasingly important.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 198 bytes
Desc: This is a digitally signed message part.
URL: 
<https://emu.freenetproject.org/pipermail/tech/attachments/20120404/2d510cc1/attachment.pgp>

Reply via email to