Some unfathomed but important questions about anti-interference ability and anti-tracking ability
I have a few questions after reading the wiki:
- The signature and encryption process requires CA, so who is the CA? How to ensure that CA is secure and trustworthy? Does Tox also use the CA authentication mechanism?
- Does the data packet sent by Ring throughout the communication process carry any identifiable features? For example, the protocol identifier, obvious packet characteristics, or other basis for ISP to identifying the Ring. I am from China, and the Great Fire Wall and ISP hardware devices have very powerful monitoring mechanisms and artificial intelligence to review protocol types and capture network traffic characteristics. Can Ring confuse and masquerade external packets and traffic characteristics to trick the monitoring devices on the data transmission link?
- I think the authorities may deploy some fake nodes into the distributed network of Ring, attempting to drop the packets and return the falsification results when receiving the routing task(just like their pollution to the DNS),if it can be done successfully? And if yes, then if the source device who requesting the routing will be aware and continue to try to contact other available nodes?
Sorry for so many questions, the wiki is not easy enough to understand for some special network situations which are really really unfree, we'll feel grateful for your answer.