Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Use Meta Data in the first Packet to stir the traffic flowEncrypt traffic

Adaptive Encryption,        if traffic already encrypted> do nothing, if not encrypted > encrypt.

No Tunneling > no need to setup and maintanint tunnel state