This post was originally published on this site

Interesting research in using traffic analysis to learn things about encrypted traffic. It’s hard to know how critical these vulnerabilities are. They’re very hard to close without wasting a huge amount of bandwidth.

The active attacks are more interesting.

This post first appeared on scheiner. Read the original article.

About The Author

Related Posts