Re: RE: Obama calls out encryption in terror strategy speech
One of the cute tricks I came up with similar to one of the encryption methods used by the military, frequency agility except I would use port hopping. Without the one right listening patterns, it looks like trash. To add to the fun have a near random destination IP pattern too.
Of course it should work both ways and you should have reasonable looking destination usages. To give credit where credit is due, port knocking gave me a clue.