On Wednesday, 20. May 2009 18:14:53 Matthew Toseland wrote:
> Depends on your threat model. Freenet traffic clearly doesn't look like
> these without proper stego transport plugins, and the connections between
> nodes definitely don't look like them, unless what you are imitating is
> purely peer to peer, in which case you need to look at the other nodes'
> connections as well and/or the timing. 

Is a steganography transport plugin planned? 

The option of going really deep into hiding is one of the ideas behind freenet 
which appealed to me the most. 

> Also, we can't use TCP at the
> moment.

That's why I searched for services which also use UDP. 

Else the list would have been far longer... :) 

Best wishes, 
Arne

--- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- 
   - singing a part of the history of free software -
              http://infinite-hands.draketo.de

Attachment: signature.asc
Description: This is a digitally signed message part.

_______________________________________________
Devl mailing list
[email protected]
http://emu.freenetproject.org/cgi-bin/mailman/listinfo/devl

Reply via email to