Replying to Avatar Hanshan

👀👀👀

"a host running Cloak server is indistinguishable from an innocent web server.

Both while passively observing traffic flow to and from the server, as well as while actively probing the behaviours of a Cloak server.

This is achieved through the use a series of cryptographic steganography techniques."

https://github.com/cbeuw/Cloak

Avatar
Schroedinger 1y ago

Maybe someone smarter than me will find this useful.

nostr:nevent1qqs82y22jv2qmpqykgzlmurlueun0rtmjz0vpy0s3mdzlq086pnzpacpg3mhxw309ahhsarjv3jhvctkxc685d35093rw7pkwf4xwdrww3a8z6ngv4jx6dtzx4ax5ut4d36kw6mwdpa8ydpkdeunyutzv9jzummwd9hkutczyruct5cfr97gqhshr8rnrpd4wn7raeq86lqmv9taa6vudt8ztxdmkqcyqqqqqqgrn5pnt

Reply to this note

Please Login to reply.

Discussion

No replies yet.