2 Sep
2005
2 Sep
'05
5:26 p.m.
On 9/2/05, Stephen J. Wilcox <steve@telecomplete.co.uk> wrote: [snip]
packet inspection will just evolve, thats the nature of this problem.. there are things you can find out from encrypted flows - what the endpoints and ports are, who the CA is. then you can look at the characteristics of the data.
to that end, I'm been watching the development of TOR <http://tor.eff.org/> with great interest. -- darkuncle@{gmail.com,darkuncle.net} || 0x5537F527 encrypted email to the latter address please http://darkuncle.net/pubkey.asc for public key