Dear Liste, concerned Tor relay operators, TCP abolitionists and so called
network forensics experts,
We already have several tools that can detect various types of TCP injection
attacks; for instance:
https://github.com/david415/HoneyBadger
For fun I'll write some TCP inference exploits as
https://threatpost.com/serious-tcp-bug-in-linux-systems-allows-traffic-hijacking/119804/
… The vulnerable TCP implementation (CVE-2016-5696) could affect an
untold number of devices running Linux, including embedded computers,
mobile phones and more. …
… Attacks can disrupt or degrade supposedly