think you could split your network and lets say half that packet goes through china and the other half goes through Finland and then come together again as the same packet.
What you could do is have the network traffic go from US to China to Finland to destination. The traffic itself would be encrypted and would only become unencrypted once it reaches the destination.
Maybe not even split the packet, just split groups of packets.
If you use a proxy that is not on port 80 or 443, it may work
http://www.behindthefirewalls.com/2013/06/anonymizing-your-attacks-with-tor-and.html
roxychains ng (new generation) - a preloader which hooks calls to sockets in dynamically linked programs and redirects it through one or more socks/http proxies. continuation of the unmaintained proxychains project
https://github.com/rofl0r/proxychains-ng
What you could do is have the network traffic go from US to China to Finland to destination. The traffic itself would be encrypted and would only become unencrypted once it reaches the destination.
Maybe not even split the packet, just split groups of packets.
If you use a proxy that is not on port 80 or 443, it may work
http://www.behindthefirewalls.com/2013/06/anonymizing-your-attacks-with-tor-and.html
roxychains ng (new generation) - a preloader which hooks calls to sockets in dynamically linked programs and redirects it through one or more socks/http proxies. continuation of the unmaintained proxychains project
https://github.com/rofl0r/proxychains-ng
No comments:
Post a Comment