Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> VPNs and zero knowledge proof systems are vulnerable to traffic analysis (based on packet size and timestamps) and there's almost no cure.

All comms are subject to traffic analysis except surreptitious, covert channels (which can't be covert if the implementations are widely available).



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: