On 09/08/2011 05:23 PM, Matthew wrote: > > http://www.guardian.co.uk/world/2011/aug/30/pakistan-bans-encryption-software > >
Very disturbing. I wonder if its possible to hide encrypted traffic as seemingly unencrypted http traffic in much the same way as a gpg key is rendered as ascii armored, or stenographically inside images. Although such methods may be inefficient, they may be good enough for some purposes. It would be good to know what technologies these ISPs will implement to do the packet inspection for encrypted tunnels. Half the problem is you don't really know what they'll be looking for and so you don't know how to circumvent. -- Anthony G. Basile, Ph. D. Chair of Information Technology D'Youville College Buffalo, NY 14201 (716) 829-8197 _______________________________________________ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk