On 10/20/05, Mike Ireton <mike-open...@tiedyenetworks.com> wrote: > Leonard Isham wrote: > > > > > Merge the encrypted and unencrypted traffic for each side. Look for > > missing unencrypted packets and then compare encrypted packets that > > follow and look for a correlation of one or more missing or out of > > order encrypted packets. Also non-trivial. > > > > > I think you don't understand what encryption is or does.
Nasty comments are starting. I'm not going to bother reading further. If I offended anyone I apologise. I am stopping any further comments, by me, on this thread. -- Leonard Isham, CISSP Ostendo non ostento.