Comment Sounds workable (Score 1) 128
Actually, it seems that any program which could pass the information would have to pass the same information no matter what level of abstraction it uses to do it and would, in theory, still be illegal. But there's a question of detection and enforcement... It seems doable in principle: A process monitoring some chosen shared resource acts as listener, another process acts to perturb shared resources and send information, and with the signal path established run whatever protocol you like over it.
-- Ben