On Wednesday 30 August 2006 22:35, inverse wrote:
> beyond harvesting the connected IP addresses to raid their owner's
> homes, one big concern with encrypted protocols is that they can be
> filtered out by application-level scanning firewalls. I think this is
> exactly what's happening in China.
Yes, the session bytes that are used to initiate connections are
typical.
> Public-key encrypted communications show constant patterns the moment
> a public key is exchanged between hosts.
Communication between 0.7 nodes doesn't have to exchange public keys,
those are already known as they are contained in the node reference.
David
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 191 bytes
Desc: not available
URL:
<https://emu.freenetproject.org/pipermail/support/attachments/20060830/6fcad4a8/attachment.pgp>