Re: Stealth Computing Abuses TCP Checksums