Search Mailing List Archives

Limit search to: Subject & Body Subject Author
Sort by: Reverse Sort
Limit to: All This Week Last Week This Month Last Month
Select Date Range     through    

[liberationtech] Obfuscation / Network Steganography Research

Collin Anderson collin at
Sun Nov 3 22:19:45 PST 2013

Philipp Winter keeps a fairly comprehensive and up-to-date archive of
papers that often cover network steganography for circumvention purposes
under CensorBib:

On Sun, Nov 3, 2013 at 11:29 PM, Lucas Dixon <ldixon at> wrote:

> Hi,
> I'm trying to put together a good reading and person list for what is
> currently known on network steganography (in particular, network traffic
> obfuscation):
> What are the methods by which one type of traffic can be distinguished
> from another, and how can one type of traffic be hidden as another. How
> much computation and extra bandwidth do you have to pay to make it how much
> harder to distinguish? And what's the current computation and memory
> capacity of DPI machines?
> Any suggestions?
> Thanks!
> lucas
> --
> Lucas Dixon | Google Ideas
> --
> Liberationtech is public & archives are searchable on Google. Violations
> of list guidelines will get you moderated:
> Unsubscribe, change to digest, or change password by emailing moderator at
> companys at

*Collin David Anderson* | @cda | Washington, D.C.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <>

More information about the liberationtech mailing list