Interesting concept. Did you think about using in-game voice communications to speed up throughput? Taking the covert data and encoding it into an encrypted audio stream, and make it look like normal game chatter?
Just a thought. ---- Is there a reason for the references to be unordered? 16, 13, 20-22, 12, 9, 24, 26, 10, 18, 25, 15, 14, 11, 3, 1, 11, 5, 18, 25, 6, 14, 15, 11, 8, 17, 7, 11, 7, 2, 11, 4, 23, 19, 6 Its kind of crazy. ---- One quick find: "Custom Game Clients: A motivated adversary may also attempt to detect users of Castle by running their own game client. They may then join games in popular game lobbies and analyze maps and commands issued by players. *inspecting*" Everything before and after inspecting is missing. Kind regards, Matt Speak Freely -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk