9 Aug
1993
9 Aug
'93
10:46 p.m.
While you're at it, another source for traffic analysis is DNS requests;
dns requests are not generally logged, so i guess you're considering a generalized net snooper in your threat model, in which case discovery of dns requests is the least of your concerns. peter