additional server hops between client and target server, Tor like encryption, packet shuffling and fake packets inserted into data stream along with a few other packet tricks

Reply to this note

Please Login to reply.

Discussion

No replies yet.