On Wednesday 30 August 2006 22:35, inverse wrote: > beyond harvesting the connected IP addresses to raid their owner's > homes, one big concern with encrypted protocols is that they can be > filtered out by application-level scanning firewalls. I think this is > exactly what's happening in China.
Yes, the session bytes that are used to initiate connections are typical. > Public-key encrypted communications show constant patterns the moment > a public key is exchanged between hosts. Communication between 0.7 nodes doesn't have to exchange public keys, those are already known as they are contained in the node reference. David -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 191 bytes Desc: not available URL: <https://emu.freenetproject.org/pipermail/support/attachments/20060830/6fcad4a8/attachment.pgp>