Florent Daigni?re (NextGen$) wrote:
> * Matthew Toseland <toad at amphibian.dyndns.org> [2007-02-11 00:50:31]:
>> http://www.securityfocus.com/infocus/1843/3

Nasty - see also
http://www.cs.ucr.edu/~tkarag/papers/BLINC.pdf

> We are safe from that when using darknet ;)

Right, we just look like someone holding ten simultaneous 72-hour Skype 
conversations. ;-)

> According to the end of the article, they plan to use size of packets to
> identify the p2p traffic as well ... We are immune to that too as we do
> use random size padding, aren't we ?

Only if everyone else uses random padding with the same statistical 
distribution...

There seems to be two approaches we could take:
1) Standardising approach: try to persuade a wide range of P2P and VoIP 
projects to use the same encrypted UDP protocol. Lots of effort and 
unlikely to succeed, but if it works we can hide among a large amount of 
traffic, some of which will be politically awkward to block.
2) Guerrilla approach: keep writing new transport plugins and try to 
stay ahead of the filters. The problem is that you know when you've been 
filtered, but you don't know when you've been logged.

Cheers,
Michael

Reply via email to