On 10/20/05, Mike Ireton <mike-open...@tiedyenetworks.com> wrote:
> Leonard Isham wrote:
>
> >
> >  Merge the encrypted and unencrypted traffic for each side.  Look for
> > missing unencrypted packets and then compare encrypted packets that
> > follow and look for a correlation of one or more missing or out of
> > order encrypted packets.  Also non-trivial.
> >
>
>
>         I think you don't understand what encryption is or does.

Nasty comments are starting.

I'm not going to bother reading further.

If I offended anyone I apologise.  I am stopping any further comments,
by me, on this thread.

--
Leonard Isham, CISSP
Ostendo non ostento.

Reply via email to