The french have an Hadopi law to prevent piracy.
The ACTA also tries to prevent piracy and introduce strong rules.
Basically DPI will come up (Deep Packet Inspection)
An idea for Indetectable Piracy/Transport :
(1) We want to transport binary data
(2) We want it to be indetectable
(3) We have VoIP/GoogleChat
=> Transform the data into noise (bip for zero, BEEP for one)
and send it inside the WebCam/Phone call over Skype/VoIP.
Doing so could :
(1) Mix phone call and data transfer (yeah !)
(2) Prevent detection (what the #!, I'm just chatting with my friends .. that noise ? radio ??)
(3) Allow peering through conferencing
And no problem with bandwidth : many VoIP services are free now.
If by the way s/o is interested .. It could end up as a Skype
plugin or a pure "Data to noise" and "Noise to data"
cool program
It's just like public key cryptography hadn't been invented!
Name:
Anonymous2010-09-23 4:32
Yes but cryptography does not hide the data behind
some kinda 'normal activity'
Unless you use an encrypted VPN to say 'F# off I don't want
anyone/government to see my grandma's photos -and my mp3s-
every crypted and heavy transfer is "suspect"
If you want heavy or long running transfer to remain
"obfuscated" into something "daily", it could be the trick.
There's another idea with merely the same objectives :
faxing an A4 page of QR Codes (obfuscate by rotating/cutting
into pieces/ png and jpg .. so on)
Because the amount of data is huge and the transfer LOOKS
like normal activity, thus preventing DPI
Encryption is ubiquitous(for all kinds of usages) in today's Internet. Just use it and don't worry. DPI can't really do anything about it, also DPI if applied will likely be applied to places which don't generate that much traffic, it is not likely to be applied to large datacenters, backbones or servers you own.
>>4
DPI will be applied to all places with any traffic.
Most ``pirates'' don't know how to install windows, do you expect them to use cryptographic solutions that connect to your servers?
Of course OP's idea is even more unrealistic.
I can only think of making BT data traffic harder to identify or more expensive to process, e. g. mimic FTP or HTTP data packets so that DPI device will have to use more processor power in attempts to associate them to an active session.
Name:
Anonymous2010-09-23 6:15
PKI is not suitable for anonymous peer networking. SSL is prone to man in the middle attacks. Captcha or Turing testing for main in the middle is a pain in the ass and not completely safe from party van. I'd just encrypt the protocol and wrap it over HTTPS if shit gets worse, and if shit gets as bad as to stop this from working (which is unlikely as the Internet is a huge gaping vagina the size of a hallway), pick random 1 GB image collection of very low quality images and use steganography, which is going to suck so I hope we never have to.
Name:
Anonymous2010-09-23 6:53
I'll just use IPoAC Mmh, delicious Deep Pigeon Inspection
which is unlikely as the Internet is a huge gaping vagina the size of a hallway
It's interesting that you seem to come from the imageboards yet you're the only one who came up with a sensible solution.
Name:
Anonymous2010-09-23 7:54
Use P2P to distribute large amounts of free-distributable content. Share all the Debian CDs, both Lenny and Squeeze, and make them go round and round. Share them, delete them, get them again from the P2P network, loop. Do the same with Wikipedia databases, or whatever you can think of.
Simply give them the extra work of recognize piracy traffic from legit.
>>6
No it won't be applied. The volume of traffic is very large for backbones and various datacenters. Also, the Internet is much larger than one country, don't expect everyone to bend to your will, take a look at the current state of the Internet.
Assuming that the NSA already cracked AES and RSA, let's send the contents of /dev/urandom to each other to baffle them! It should be pretty funny until we get vanned.