Encrypted Traffic Inspection
The cluster discusses methods and challenges for inspecting or monitoring encrypted network traffic, including deep packet inspection, VPN obfuscation, traffic analysis, and potential surveillance concerns.
Activity Over Time
Top Contributors
Keywords
Sample Comments
How are they inspecting your network traffic?
If traffic is encrypted, and there is constant other traffic to same server, then it might be hard to identify.
exactly. how can one be sure that it doesn't use the network for its own nefarious purposes while hiding its own network activity ?
How will they monitor encrypted traffic?
No. Check the concept of Deep packet inspection.https://en.m.wikipedia.org/wiki/Deep_packet_inspection
It's probably using the VPN mechanism to grab traffic for inspection and can't do what it does without that.
I don't think that'll thwart deep-packet inspection.
By the same logic, won't they be able to detect SSH tunneled traffic too?
with nation-state resources, are there not traffic analysis options that could work?
Clients can obfuscate traffic though?