quoting👀👀👀
nevent1q…5pnt
"a host running Cloak server is indistinguishable from an innocent web server.
Both while passively observing traffic flow to and from the server, as well as while actively probing the behaviours of a Cloak server.
This is achieved through the use a series of cryptographic steganography techniques."
https://github.com/cbeuw/Cloak
Schroedinger on Nostr: Maybe someone smarter than me will find this useful. ...
Maybe someone smarter than me will find this useful.