On Wednesday, 20. May 2009 18:14:53 Matthew Toseland wrote: > Depends on your threat model. Freenet traffic clearly doesn't look like > these without proper stego transport plugins, and the connections between > nodes definitely don't look like them, unless what you are imitating is > purely peer to peer, in which case you need to look at the other nodes' > connections as well and/or the timing.
Is a steganography transport plugin planned?
The option of going really deep into hiding is one of the ideas behind freenet
which appealed to me the most.
> Also, we can't use TCP at the
> moment.
That's why I searched for services which also use UDP.
Else the list would have been far longer... :)
Best wishes,
Arne
--- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- ---
- singing a part of the history of free software -
http://infinite-hands.draketo.de
signature.asc
Description: This is a digitally signed message part.
_______________________________________________ Devl mailing list [email protected] http://emu.freenetproject.org/cgi-bin/mailman/listinfo/devl
