On Fri, Oct 17, 2014 at 12:13:55PM -0400, Ian Grant wrote:
> On Fri, Oct 17, 2014 at 4:24 AM, Bret Lambert <bret.lamb...@gmail.com> wrote:
> > On Thu, Oct 16, 2014 at 02:48:22PM +0200, Martin Schr??der wrote:
> >> 2014-10-16 13:16 GMT+02:00 Kevin Chadwick <ma1l1i...@yahoo.co.uk>:
> >> The impossibility to scan for services - which the NSA/GHCQ/... do.
> >
> > It's a good thing that traffic analysis isn't a thing, then. Otherwise
> > they'd be able to check if traffic purporting to go to port 80/443
> > doesn't look like HTTP traffic, or something.
> 
> They don't have any clue which traffic to analyze though, so this
> traffic is a needle in a haystack.

Well, if, as Herr Schroeder seems to be implying, this is used to
avoid port scans, I'd look for traffic to/from address:port which
don't show up on scans.

> Also, the VPN could be tunneled
> over HTTP if necessary.

I know of at least one company which sells a product which doesn't
just read headers, but classifies traffic based upon behavior, e.g.,
"small request receives large response -> bulk transfer", or
"series of tiny packets which receive a single, larger response ->
interactive session". I assume nation-states have developed similar
capabilities.

The ability to use statistical methods to eavesdrop on encrypted
SIP sessions comes to mind as an example of traffic analysis as a
tool to defeat adversaries who are attempting to secure their
communications.

Reply via email to