ANON: Re: how does it work

peter honeyman honey at citi.umich.edu
Mon Aug 9 15:46:40 PDT 1993


> While you're at it, another source for traffic analysis is DNS requests;

dns requests are not generally logged, so i guess you're considering
a generalized net snooper in your threat model, in which case discovery
of dns requests is the least of your concerns.

	peter







More information about the cypherpunks-legacy mailing list