From: peter honeyman <honey@citi.umich.edu>
To: wcs@anchor.ho.att.com (Bill_Stewart(HOY002)1305)
Message Hash: 26fd1160f45ef85eb723c4c2840767575d713925335c79cda38fd186cb7c79b8
Message ID: <9308092243.AA21216@toad.com>
Reply To: N/A
UTC Datetime: 1993-08-09 22:46:40 UTC
Raw Date: Mon, 9 Aug 93 15:46:40 PDT
From: peter honeyman <honey@citi.umich.edu>
Date: Mon, 9 Aug 93 15:46:40 PDT
To: wcs@anchor.ho.att.com (Bill_Stewart(HOY002)1305)
Subject: Re: ANON: Re: how does it work
Message-ID: <9308092243.AA21216@toad.com>
MIME-Version: 1.0
Content-Type: text/plain
> While you're at it, another source for traffic analysis is DNS requests;
dns requests are not generally logged, so i guess you're considering
a generalized net snooper in your threat model, in which case discovery
of dns requests is the least of your concerns.
peter
Return to August 1993
Return to “peter honeyman <honey@citi.umich.edu>”
1993-08-09 (Mon, 9 Aug 93 15:46:40 PDT) - Re: ANON: Re: how does it work - peter honeyman <honey@citi.umich.edu>