Hmmm... maybe that's why my SSH connections from home always constantly get
expectantly shutdown.

Maybe people should be hiding things out in the open.  Like, make it look
like normal (unencrypted) HTTP, SMTP, or POP3 traffic (or something pretty
common like those)... and hide the data in the data stream.

For instance... make it look like an image is being downloaded... and hide
data in there... etc.

See ya

On 9/19/07, Roop Mukherjee <[EMAIL PROTECTED]> wrote:
>
> Apparently ISPs are degrading service to p2p traffic and everything
> encrypted for their users.
> http://it.slashdot.org/article.pl?sid=07/04/07/1755230
>
> 1. Does anyone know what packet inspection algorithms are being used for
> ISPs for finding p2p traffic? Given the variety of p2p protocols in use
> and the frequency at which they change I would guess that a port based or
> bit
> pattern based filers would not be totally effective.
> 2. Are their ways that p2p data that uses ssh can be distinguished from
> say an e-commerce transaction by an ISP?
>
> -- Roop
> _______________________________________________
> p2p-hackers mailing list
> [email protected]
> http://lists.zooko.com/mailman/listinfo/p2p-hackers
>



-- 
    Charles Iliya Krempeaux, B.Sc. <http://ChangeLog.ca/>


                 Vlog Razor... Vlogging News
                    http://vlograzor.com/
_______________________________________________
p2p-hackers mailing list
[email protected]
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Reply via email to