Registered | 8 months ago |
Last Visited | last month |
Total Posts | 1 |
by torfan in Security Questions
![]() | torfan 8 months ago |
So let's consider this attack model:
The enemy can surveil all traffic at an internet-provider $ISP, therefore all traffic that goes from a $ISP-Customer to the $ISP (or any other customer) and back.
Let's also assume the enemy can surveil all in- and outgoing traffic from/to a specific ser