<s>
In	O
computer	B-Architecture
networking	I-Architecture
,	O
TCP	B-Protocol
Stealth	I-Protocol
is	O
a	O
proposed	O
modification	O
of	O
the	O
Transmission	B-Protocol
Control	I-Protocol
Protocol	I-Protocol
(	O
TCP	O
)	O
to	O
hide	O
open	B-Protocol
ports	I-Protocol
of	O
some	O
TCP	O
services	O
from	O
the	O
public	O
,	O
in	O
order	O
to	O
impede	O
port	O
scans	O
.	O
</s>
<s>
If	O
the	O
connection	O
attempt	O
does	O
not	O
use	O
TCP	B-Protocol
Stealth	I-Protocol
,	O
or	O
if	O
authentication	O
fails	O
,	O
the	O
server	O
acts	O
as	O
if	O
no	O
service	O
was	O
listening	O
on	O
the	O
port	O
number	O
.	O
</s>
<s>
The	O
draft	O
was	O
written	O
by	O
researchers	O
from	O
the	O
Technische	O
Universität	O
München	O
,	O
Jacob	O
Appelbaum	O
of	O
the	O
Tor	B-Application
Project	I-Application
and	O
Holger	O
Kenn	O
from	O
Microsoft	O
.	O
</s>
