👀👀👀

"a host running Cloak server is indistinguishable from an innocent web server.

Both while passively observing traffic flow to and from the server, as well as while actively probing the behaviours of a Cloak server.

This is achieved through the use a series of cryptographic steganography techniques."

https://github.com/cbeuw/Cloak

Reply to this note

Please Login to reply.

Discussion

Very interesting, saved the link to look into it later 🤙

Sounds a lot like the obfsproxy bridges that Tor has had for the last 11 years or so.

Curious what differences there are that make it more novel -- perhaps just that it's designed for use with normal VPN's? I'll give it a read over in a bit; thanks for the link.

let's us know what you think