this post was submitted on 30 Jan 2025
291 points (98.3% liked)
Technology
61227 readers
4326 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related content.
- Be excellent to each other!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, to ask if your bot can be added please contact us.
- Check for duplicates before posting, duplicates may be removed
- Accounts 7 days and younger will have their posts automatically removed.
Approved Bots
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Sure, but one of the benchmarks of a good cryptographic algorithm is to reduce the amount of meta information you can get from a random sampling. Most of the timing attacks are looking for traffic activity to pattern match ultimate source and receiver. If the encrypted tunnel is always exactly 10mbps of cryptographic traffic, then it would be much harder to identify
Yes as with almost everything the ability to do a thing is just a function of how much you want to do it.