Hi Bill, >I would also mention packet sizes and timing in addition to payload >content. My understanding is that you can recover a surprising amount >of useful information without even looking at the payloads.
I would agree with you that a an attacker can extrapolate a lot about the data, using packet sizes and timing. But do you feel that the size of the packets and the timing can be used to correlate the IDENTITY of the victim? Thanks Suresh -------------------------------------------------------------------- IETF IPv6 working group mailing list [EMAIL PROTECTED] Administrative Requests: https://www1.ietf.org/mailman/listinfo/ipv6 --------------------------------------------------------------------