Interesting concept.

Did you think about using in-game voice communications to speed up
throughput? Taking the covert data and encoding it into an encrypted
audio stream, and make it look like normal game chatter?

Just a thought.

----

Is there a reason for the references to be unordered?

16, 13, 20-22, 12, 9, 24, 26, 10, 18, 25, 15, 14, 11, 3, 1, 11, 5, 18,
25, 6, 14, 15, 11, 8, 17, 7, 11, 7, 2, 11, 4, 23, 19, 6

Its kind of crazy.

----

One quick find:

"Custom Game Clients: A motivated adversary may also attempt to detect
users of Castle by
running their own game client. They may then join games in popular game
lobbies and analyze
maps and commands issued by players. *inspecting*"


Everything before and after inspecting is missing.



Kind regards,

Matt
Speak Freely
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Reply via email to