this post was submitted on 30 Jan 2025
282 points (98.3% liked)

Technology

61227 readers
4220 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
 

From Mullvad

you are viewing a single comment's thread
view the rest of the comments
[โ€“] jet@hackertalks.com 11 points 1 day ago* (last edited 1 day ago) (1 children)

Sure, but one of the benchmarks of a good cryptographic algorithm is to reduce the amount of meta information you can get from a random sampling. Most of the timing attacks are looking for traffic activity to pattern match ultimate source and receiver. If the encrypted tunnel is always exactly 10mbps of cryptographic traffic, then it would be much harder to identify

[โ€“] seven_phone@lemmy.world 4 points 1 day ago

Yes as with almost everything the ability to do a thing is just a function of how much you want to do it.