Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

You could tunnel with stunnel, which I think would make it quite difficult to fingerprint and distinguish from an ordinary TLS connection.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: