Yes, we can also use other protocols as bridges, to obfuscate. And we can improve encryption or have forwarding services.
There are lots of options and ideas, but we need the will to pursue them.
Yes, we can also use other protocols as bridges, to obfuscate. And we can improve encryption or have forwarding services.
There are lots of options and ideas, but we need the will to pursue them.
Are you questioning my will? ;)