On Wed, Jul 25, 2012 at 9:18 PM, David Fifield wrote:
> This is a summary of some discussion among developers of pluggable
> transports about steganographic channels and deriving them from protocol
> grammars. Two things prompted the discussion:
>
> [snip]
>
> David (yours truly) wants to write or
On Wed, Jul 25, 2012 at 11:56 PM, Robert Ransom wrote:
> On 7/26/12, David Fifield wrote:
>
>> We can use appid-like signatures to make steganographic channels, if we
>> assume that the signatures are a realistic reflection of actual use of
>> the protocols. But: this relies critically on the acc
On 7/26/12, David Fifield wrote:
> We can use appid-like signatures to make steganographic channels, if we
> assume that the signatures are a realistic reflection of actual use of
> the protocols. But: this relies critically on the accuracy of the model.
> (Specifically, does it match the censor'
This is a summary of some discussion among developers of pluggable
transports about steganographic channels and deriving them from protocol
grammars. Two things prompted the discussion:
* A program called appid, http://code.google.com/p/appid/ , which
compiles simple protocol specifications into