On 09/08/2011 08:02 PM, David H. Lipman wrote: > From: "Anthony G. Basile" <bas...@opensource.dyc.edu> > >> On 09/08/2011 05:23 PM, Matthew wrote: >>> >>> http://www.guardian.co.uk/world/2011/aug/30/pakistan-bans-encryption-software >>> >>> >> >> Very disturbing. I wonder if its possible to hide encrypted traffic as >> seemingly unencrypted http traffic in much the same way as a gpg key is >> rendered as ascii armored, or stenographically inside images. Although >> such methods may be inefficient, they may be good enough for some purposes. >> >> It would be good to know what technologies these ISPs will implement to >> do the packet inspection for encrypted tunnels. Half the problem is you >> don't really know what they'll be looking for and so you don't know how >> to circumvent. >> > > LOL > > Steganography not stenography. ;-) > > They are vastly different concepts. >
Yeah! The hand is faster than the brain. -- Anthony G. Basile, Ph. D. Chair of Information Technology D'Youville College Buffalo, NY 14201 (716) 829-8197 _______________________________________________ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk