On 9/2/05, Stephen J. Wilcox <[EMAIL PROTECTED]> wrote: [snip] > packet inspection will just evolve, thats the nature of this problem.. there > are > things you can find out from encrypted flows - what the endpoints and ports > are, > who the CA is. then you can look at the characteristics of the data.
to that end, I'm been watching the development of TOR <http://tor.eff.org/> with great interest. -- [EMAIL PROTECTED],darkuncle.net} || 0x5537F527 encrypted email to the latter address please http://darkuncle.net/pubkey.asc for public key