I agree with Michael's idea of core parts vs replaceable parts (such as the
type of cover traffic) since I feel much of the censorship circumvention
still relies on how the landscape looks like and that there isn't a clear
cut, theory-based solution to the problem (in the way you argue for example
Hey Leeroy,
On your last point: yeah a traffic capture follows by TCP packet
reconstruction and thus reconstruction of the bittorrent messages and a
check against the original checksums of the pieces (as specified in the
torrent file) will show that a connection was not genuine (very likely it
was
sing the Adversary Labs tools I have been developing.
>
> By the way, George is on my committee as well!
>
> On Saturday, February 28, 2015, Dan Cristian Octavian <
> danoctavia...@gmail.com> wrote:
>
>> Hello!
>>
>> My name is Dan, I've been workin
Hi Leeroy,
If I understand correctly, you are arguing that my assumption that
bittorrent is unlikely to be blocked is faulty. I don't have a strong
argument against this, other than that it would be a very drastic move
since for that part of the world bittorrent is the main way to get access
to me
5 at 2:01 PM, David Fifield wrote:
> On Sat, Feb 28, 2015 at 10:46:03AM -0800, Dan Cristian Octavian wrote:
> > My name is Dan, I've been working on a pluggable transport for Tor based
> on
> > bittorrent as cover traffic and wanted to let you know about it.
> >
Hello!
My name is Dan, I've been working on a pluggable transport for Tor based on
bittorrent as cover traffic and wanted to let you know about it.
https://github.com/danoctavian/bit-smuggler
In a nutshell, I'm tunnelling a data stream through a bittorrent peer
connection that is created by real