"How would you turn this into a usable tool?" If one knew all communication events between all possible hosts over time, then that organization could identify the likely relevant endpoint security to attack (e.g. using a library of purchased zero-day exploits) on, say, the likely paths of Tor connection. If they could compromise all of those hosts, they could get behind the encryption when the next conversation occurred.
Marcus -------------------------------------------------------------------- mail2web.com – Enhanced email for the mobile individual based on Microsoft® Exchange - http://link.mail2web.com/Personal/EnhancedEmail ============================================================ FRIAM Applied Complexity Group listserv Meets Fridays 9a-11:30 at cafe at St. John's College to unsubscribe http://redfish.com/mailman/listinfo/friam_redfish.com
