wkrp

Results 338 comments of wkrp

There's an existing thread about WireGuard obfuscation: #223. If you're taking the approach of modifying the Linux kernel module, look particularly at this prior project: WireGuard with obfuscation support https://lists.zx2c4.com/pipermail/wireguard/2021-September/007142.html...

> There was a previous attempt in Shadowsocks in addressing the decryption oracle, known as ota mode, which is not working and we could try to learn from it: https://prinsss.github.io/why-do-shadowsocks-deprecate-ota/....

There are some past systems that have used email as a circumvention channel: * [SWEET: Serving the Web by Exploiting Email Tunnels](https://censorbib.nymity.ch/#Zhou2013a) (2013) * [Leveraging Internet Services to Evade Censorship](https://censorbib.nymity.ch/#Zarras2016a)...

The [Tor anti-censorship team](https://gitlab.torproject.org/tpo/anti-censorship/team) discussed this paper on 2023-11-09. The discussion included two of the authors of the paper. http://meetbot.debian.net/tor-meeting/2023/tor-meeting.2023-11-09-16.00.log.html#l-56

A couple of papers that may be examples of the host-based analysis this paper talks about: [Towards Aggregated Features: A Novel Proxy Detection Method Using NetFlow Data](https://ieeexplore.ieee.org/document/9408011) (2020) [PDF](https://github.com/net4people/bbs/files/13632094/Fu2020a.pdf) >...

The author of ShadowTLS has a blog post with thoughtful reflection on the problems with the V1 protocol and the changes in V2 (archive links because I had trouble accessing...

A more elaborate treatment of Lox is available in Lindsey Tulloch's 2022 thesis. [Lox: Protecting the Social Graph in Bridge Distribution](https://hdl.handle.net/10012/18333) (142 pages)

Can you say more about what indicates the IPs are hijacked? Hijacked or "borrowed" IP addresses was a hypothesis put forth in some GFW active probing papers: https://censorbib.nymity.ch/#Winter2012a > One...

> TorKameleon's mechanisms are based on the Insertable Stream/Encoded Transforms WebRTC API This is a really interesting aspect of the work to me. The [WebRTC Encoded Transform](https://developer.mozilla.org/en-US/docs/Web/API/WebRTC_API/Using_Encoded_Transforms) API ([formerly called](https://github.com/w3c/webrtc-encoded-transform/blob/c631e722a0563a1dc6d542b43e574ca4020cce70/explainer.md)...

Replay attack is a general concept. The effect of a replay depends on the details of the protocol used. For some protocols it matters, for some it doesn't. Generally, replay...