From: "Anthony G. Basile" <bas...@opensource.dyc.edu> > On 09/08/2011 05:23 PM, Matthew wrote: >> >> http://www.guardian.co.uk/world/2011/aug/30/pakistan-bans-encryption-software >> >> > > Very disturbing. I wonder if its possible to hide encrypted traffic as > seemingly unencrypted http traffic in much the same way as a gpg key is > rendered as ascii armored, or stenographically inside images. Although > such methods may be inefficient, they may be good enough for some purposes. > > It would be good to know what technologies these ISPs will implement to > do the packet inspection for encrypted tunnels. Half the problem is you > don't really know what they'll be looking for and so you don't know how > to circumvent. >
LOL Steganography not stenography. ;-) They are vastly different concepts. -- Dave Multi-AV Scanning Tool - http://multi-av.thespykiller.co.uk http://www.pctipp.ch/downloads/dl/35905.asp _______________________________________________ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk