From Mullvad

  • seven_phone@lemmy.world
    link
    fedilink
    English
    arrow-up
    6
    arrow-down
    2
    ·
    23 hours ago

    You can always see the signal in the noise, that is the point of the signal and therein lies the rub.

    • pebbles@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      6
      arrow-down
      3
      ·
      16 hours ago

      If ya do it right, you can’t distinguish the signal from the noise. Encryption makes data look random. So if you send dummy random data then it just looks like constant random data. No signal is distinguishable.

    • jet@hackertalks.com
      link
      fedilink
      English
      arrow-up
      11
      ·
      edit-2
      23 hours ago

      Sure, but one of the benchmarks of a good cryptographic algorithm is to reduce the amount of meta information you can get from a random sampling. Most of the timing attacks are looking for traffic activity to pattern match ultimate source and receiver. If the encrypted tunnel is always exactly 10mbps of cryptographic traffic, then it would be much harder to identify

      • seven_phone@lemmy.world
        link
        fedilink
        English
        arrow-up
        4
        ·
        23 hours ago

        Yes as with almost everything the ability to do a thing is just a function of how much you want to do it.