On 9/2/05, Stephen J. Wilcox <[EMAIL PROTECTED]> wrote:
[snip]
> packet inspection will just evolve, thats the nature of this problem.. there 
> are
> things you can find out from encrypted flows - what the endpoints and ports 
> are,
> who the CA is. then you can look at the characteristics of the data.

to that end, I'm been watching the development of TOR
<http://tor.eff.org/> with great interest.
-- 
[EMAIL PROTECTED],darkuncle.net} || 0x5537F527
    encrypted email to the latter address please
    http://darkuncle.net/pubkey.asc for public key

Reply via email to