Quote:
Originally Posted by Steven Lake
The only way you'll avoid their detection these days is to be on a private darknet that uses encrypted VPN. But even that's only safe for a short time. If they really want in, they're gonna get in, and you're gonna get caught. Even the old standby of IRC isn't safe anymore.
|
If you want to look at a program designed to create a secure network, look at
WASTE. It's essentially a prototype (although perfectly usable within its limits) of a public-key file sharing network, you'd need to use social methods to get in (or have a supercomputer and 3 months) to crack the keys. And even then, it's rather futile - people have to accept your key!
The concept hasn't been pushed because there's been no need per-se, but sooner or later of the RIAA/MPAA keep pushing, someone will. (And it even has tools for frustrating DPI, such as saturating connections and even the ability to "split" packets across multiple sent packets...and these are mostly side effects of other things, you can design a LOT more tricks)
And each time the RIAA/MPAA start another tech war, which they always lose, more people stop buying and more are convinced of the "wisdom" of a private copy exception. There is never a winning hand for copyright's supporters in technical measures without becoming China (this is only a comment on their technology policy, I'd add).