How do you shape encrypted traffic? Say going through an SSH tunnel or VPN?
Not a member of The Register? Create a new account here.
Remember me on this computer? Post anonymously?