2. Extra types of field such as dummy fields are added to protocol messages
Length of messages is also dynamic.
3. Each field is encrypted by time based authenticator mod based to choose a predefined passwords from hash table to decrypt fields
This kind of protocol is a kind of defense from wireshark or sniffing
Because unknown length of fields and ordering are also different. Besides can not learn from machine, it can not be analyzed from machine.
Update or upgrade mechanism can also use to prevent rogue update.
Originally i would like to write an example to publish in github but it is so easy to write.
I keep this for my retirement entertainment.
沒有留言:
發佈留言