"needs additional citations" tag edit

The problem here is that there's very little published information, possibly because the protocol was at one time used by law enforcement.

However I'd suggest that since it's known to be implemented in at least one brand of router, since it's implemented by at least one project on Github (plus other developers' private clones) and is supported by Wireshark, and since it might still be encountered in the context of either lawful interception or illicit exfiltration of data, the paucity of information shouldn't be taken as indicating that the TZSP protocol is too obscure to justify an article. MarkMLl (talk) 10:44, 7 July 2018 (UTC)Reply