• tal@kbin.social
    link
    fedilink
    arrow-up
    1
    ·
    edit-2
    11 months ago

    Hmm. I guess most encrypted protocols aside from SSH use X.509 certs, so they wouldn’t make for great wrapper protocols, can be man-in-the-middle attacked. So if they’re willing to block SSH and MITM the others, I guess that puts them in a decent place, at least insofar as encrypted connections.

    Another option, if one controls both ends and can set things up, is steganography.

    One could use non-encrypted data, but where it’s difficult or expensive to pick out the data being used to transfer the hidden data in all the rest.

    Like, say I have an enencrypted audio stream, 16-bit samples. In the low-order bit of each sample, I can tuck data. Maybe statistical analysis could pick it up, but that’s probably not going to be trivial, and maybe you could MITM and degrade everyone’s audio, but that’s gonna be disruptive.

    I mean, probably every online video game can act as a channel for that.

    Just need a convenient way to roll out new steganography channels.

    The challenge is that hiding data in other data means that there’s gonna be overhead, because you gotta also send the other data. So it’s probably not bandwidth-efficient, and may impact performance.