On Thu, Oct 16, 2014 at 02:48:22PM +0200, Martin Schr??der wrote:
> 2014-10-16 13:16 GMT+02:00 Kevin Chadwick <ma1l1i...@yahoo.co.uk>:
> > I still don't see the benefit though but do see added complexity or
> > more code to audit.
> >
> > Reducing DDOS against a visible SSH service maybe? Reduce password
> > attempts on your logs allowing them to go after targets that might
> > actually use passwords (port change also works there, I find)?
> 
> The impossibility to scan for services - which the NSA/GHCQ/... do.

It's a good thing that traffic analysis isn't a thing, then. Otherwise
they'd be able to check if traffic purporting to go to port 80/443
doesn't look like HTTP traffic, or something.

Reply via email to