Hi Bill,
  
>I would also mention packet sizes and timing in addition to payload
>content.  My understanding is that you can recover a surprising amount
>of useful information without even looking at the payloads. 

I would agree with you that a an attacker can extrapolate a lot about the 
data, using packet sizes and timing. But do you feel that the size of the 
packets and the timing can be used to correlate the IDENTITY of the victim? 

Thanks
Suresh


--------------------------------------------------------------------
IETF IPv6 working group mailing list
[EMAIL PROTECTED]
Administrative Requests: https://www1.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------

Reply via email to