On Wednesday 30 August 2006 22:35, inverse wrote:

> beyond harvesting the connected IP addresses to raid their owner's
> homes, one big concern with encrypted protocols is that they can be
> filtered out by application-level scanning firewalls. I think this is
> exactly what's happening in China.

Yes, the session bytes that are used to initiate connections are 
typical.


> Public-key encrypted communications show constant patterns the moment
> a public key is exchanged between hosts.

Communication between 0.7 nodes doesn't have to exchange public keys, 
those are already known as they are contained in the node reference.


        David
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 191 bytes
Desc: not available
URL: 
<https://emu.freenetproject.org/pipermail/support/attachments/20060830/6fcad4a8/attachment.pgp>

Reply via email to