stealthy icon indicating copy to clipboard operation
stealthy copied to clipboard

Crypto messenger via ICMP packets.

Results 8 stealthy issues
Sort by recently updated
recently updated
newest added

Hi - wonderful program, thank you for releasing such out there! Just wanted to pose a couple of questions - and maybe also a request. 1) Project seems to not...

Currently the ack is not protected. It could be dropped or faked by an attacker. Thus, we need an ack on application layer which is cryptographically protected.

enhancement