It also makes use of a new
obfuscation technique that renders detection and cleanup more difficult to do.
Coins employing
obfuscation techniques or advanced cryptography, like Monero and ZCash, have more recently attempted to improve on Bitcoin's privacy model.
FYI
the obfuscation techniques mentioned at that URL are useful for packet inspecting ISP's in transit, but not for avoiding the IP filtering done at an end - point like Netflix.
Not exact matches
There is work being done to make this a possibility through code
obfuscation and other
techniques.
According to Sahai, previously developed
techniques for
obfuscation presented only a «speed bump,» forcing an attacker to spend some effort, perhaps a few days, trying to reverse - engineer the software.
«Confronting the fundamental lockstep / eat - what - you - kill disparity with
obfuscation, temporizing, and pretending to look the other way rather than with a cool assessment of their strategic objectives in coming to the States and what
techniques are best suited to achieving those goals.