On Wed, 21 Oct 2009, Alex Balashov wrote: | I was not aware that tools or techniques to do this are widespread or highly | functional in a way that would get them adopted in an Internet access control | application of a national scope.
Doesn't necessarily have to be hugely accurate. The authorities could simply identify a few likely suspect tunnels, then knock-on-doors and ask you to explain what the traffic in question is...