"How would you turn this into a usable tool?"

If one knew all communication events between all possible hosts over time,
then that organization could identify the likely relevant endpoint security
to attack (e.g. using a library of purchased zero-day exploits) on, say,
the likely paths of Tor connection. If they could compromise all of those
hosts, they could get behind the encryption when the next conversation
occurred.  

Marcus


--------------------------------------------------------------------
mail2web.com – Enhanced email for the mobile individual based on Microsoft®
Exchange - http://link.mail2web.com/Personal/EnhancedEmail



============================================================
FRIAM Applied Complexity Group listserv
Meets Fridays 9a-11:30 at cafe at St. John's College
to unsubscribe http://redfish.com/mailman/listinfo/friam_redfish.com

Reply via email to