Once we have met face to face and exchanged our keys, then it becomes actually possible to send secure messages to you that look like a harmless picture or a harmless message, but you can decrypt on your end into the original message that I’m trying to send. At that point, the GFW has no way to do content layer deep learning, deep packet inspection, so that’s a way to masquerade circumventing traffic as legal traffic, as normal traffic.

Keyboard shortcuts

j previous speech k next speech