On Thu, 2004-10-21 at 00:49, Pekka Savola wrote: > > "However, note that an attacker, who is on path, may be able to > > perform significant correlation based on the payloads of the packets > > on the wire. Use of temporary addresses will not prevent such payload > > based correlation" > > > > This clearly indicates that the correlation is done using data present > > in the payload. Is this text acceptable to you? > That's fine.
I would also mention packet sizes and timing in addition to payload content. My understanding is that you can recover a surprising amount of useful information without even looking at the payloads. -------------------------------------------------------------------- IETF IPv6 working group mailing list [EMAIL PROTECTED] Administrative Requests: https://www1.ietf.org/mailman/listinfo/ipv6 --------------------------------------------------------------------
