← Back to context Comment by petcat 10 hours ago It seems like these smuggle-disguise protocols are almost always trivially detectable. 3 comments petcat Reply VortexLain 7 hours ago Yes, but such tools aren't popular enough for the censor to specifically target. westurner 10 hours ago [flagged] petcat 9 hours ago what does this have to do with smuggling tcp connections over email
VortexLain 7 hours ago Yes, but such tools aren't popular enough for the censor to specifically target.
westurner 10 hours ago [flagged] petcat 9 hours ago what does this have to do with smuggling tcp connections over email
Yes, but such tools aren't popular enough for the censor to specifically target.
[flagged]
what does this have to do with smuggling tcp connections over email