Adrian Chadd writes:
On Wed, Oct 21, 2009, Alex Balashov wrote:
I was not aware that tools or techniques to do this are widespread or highly functional in a way that would get them adopted in an Internet access control application of a national scope.
Tell me more?
It's been a while since I tinkered with this for fun, but a quick abuse of google gives one relatively useful starting paper:
A lot of research papers on what is or isn't possible in traffic analysis are linked from http://freehaven.net/anonbib/topic.html#Traffic_20analysis This bibliography is updated periodically. It's a pretty big, complex topic, and the open literature could use lots more publications. -- Seth David Schoen <schoen@loyalty.org> | Qué empresa fácil no pensar en http://www.loyalty.org/~schoen/ | un tigre, reflexioné. http://vitanuova.loyalty.org/ | -- Borges, El Zahir