North American Network Operators Group

Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical

Re: P2P Darknets to eclipse bandwidth management?

  • From: Scott Francis
  • Date: Fri Sep 02 17:27:30 2005
  • Domainkey-signature: a=rsa-sha1; q=dns; c=nofws; s=beta; d=gmail.com; h=received:message-id:date:from:reply-to:to:subject:in-reply-to:mime-version:content-type:content-transfer-encoding:content-disposition:references; b=V+62L58ipH26nTTx8UDZuu3uC/fHPOHmnZSEL8D60pQ9xTq/JBTFnFI+F1YuyoGF16r9TyN6yi9g1FdvHrgnyAy9izgHcMPzjMMGv57wVJMjDCyoLXW36ukNBNZ7EXpnLfyiOaYAfMXkDJS1ci6VufPkxtw3D39umP4bM+uljig=

On 9/2/05, Stephen J. Wilcox <[email protected]> wrote:
[snip]
> packet inspection will just evolve, thats the nature of this problem.. there are
> things you can find out from encrypted flows - what the endpoints and ports are,
> who the CA is. then you can look at the characteristics of the data.

to that end, I'm been watching the development of TOR
<http://tor.eff.org/> with great interest.
-- 
[email protected]{gmail.com,darkuncle.net} || 0x5537F527
    encrypted email to the latter address please
    http://darkuncle.net/pubkey.asc for public key