Our nameless project.
grarpamp at gmail.com
Sat May 31 08:54:37 PDT 2014
> hosts that comunicate each other spoofing the
> source ip
> will recieve
> the file with spoofed ip
> in our network all the source ips are fake
> (spoofed ips)
> our project delete your real ip
> and put a one fake.
This may work in your test lan, but on the real internet, packets
with bogus src ip's are generally dropped at the customer interface
with rpf and other filters, thus breaking your app.
> With this method the reciever don't know who want to download X
> file and if the NSA or FBI get the logs of the reciever they can not use
> it for trace the origin.
They will become a receiver and trace them back with netflow.
More information about the cypherpunks