[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Traffic-analysis resistant/anonymized VPN? [Was: Re: OnionCat -- An IP-Transparent TOR Hidden Service Connector]
- To: or-talk@xxxxxxxxxxxxx
- Subject: Traffic-analysis resistant/anonymized VPN? [Was: Re: OnionCat -- An IP-Transparent TOR Hidden Service Connector]
- From: "F. Fox" <kitsune.or@xxxxxxxxx>
- Date: Thu, 26 Jun 2008 14:10:53 -0700
- Delivered-to: archiver@xxxxxxxx
- Delivered-to: or-talk-outgoing@xxxxxxxx
- Delivered-to: or-talk@xxxxxxxx
- Delivery-date: Thu, 26 Jun 2008 17:11:03 -0400
- Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:received:message-id:date:from :user-agent:mime-version:to:subject:references:in-reply-to :x-enigmail-version:content-type:content-transfer-encoding; bh=UMmX01Ok0luRF5O/vWX6tNdpgfT2LcT2qfZAmT8kNBw=; b=bdvmkDUTNcdo8+upy92h0CJnibBEc1Z+7Rq1qUPsxKEqHCAGWvV1lxg7FK+3xEn3om n5nx3a2S0KkjiMwH4Xuj+iXW4r42w5luQxLZhwRp0PsT8clqE5M4ejYQJg8DeGB5bJpe 0EV+c26OAPnmZiB03RPSR4lrTrgvy1LPeLed0=
- Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=message-id:date:from:user-agent:mime-version:to:subject:references :in-reply-to:x-enigmail-version:content-type :content-transfer-encoding; b=RhT3KUeF5AGarFfuH0CWpQ/W33LaTUCEkND9x+phnOvt25AfBd2Exxvak7ybcA+eK+ dmkL/K57a8HJbyks8/H7EslnfbztsD9579Q5GRJwc6OgsAdJYxwhlLRVR+87+VNB5gAi PibYyaeL8tg6/GVaASFd7yOV3POvmfSQne3wY=
- In-reply-to: <200806260945.34188.bf@xxxxxxxxxxxxxxxx>
- References: <200806221054.53587.bf@xxxxxxxxxxxxxxxx> <4862DBE3.4070009@xxxxxxxxx> <48630176.40808@xxxxxxxxx> <200806260945.34188.bf@xxxxxxxxxxxxxxxx>
- Reply-to: or-talk@xxxxxxxxxxxxx
- Sender: owner-or-talk@xxxxxxxxxxxxx
- User-agent: Mozilla-Thunderbird 2.0.0.14 (X11/20080509)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
I had an idea, although it's a bit off-the-wall: Could OnionCat be used
to provide a traffic-analysis-resistant, "covert," and potentially
anonymous VPN system?
We've already seen VPN technology used for non-private purposes; a good
example is gamers' heavy use of Hamachi (http://www.hamachi.cc). Perhaps
there might be some application of a similar system with the addition of
an anonymity layer, though I can't think of any right now.
Just food for thought. =:oD
- --
F. Fox
AAS, CompTIA A+/Network+/Security+
Owner of Tor node "kitsune"
http://fenrisfox.livejournal.com
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org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=QmEG
-----END PGP SIGNATURE-----