Encrypted Traffic Inspection

The cluster discusses methods and challenges for inspecting or monitoring encrypted network traffic, including deep packet inspection, VPN obfuscation, traffic analysis, and potential surveillance concerns.

📉 Falling 0.5x Security
3,835
Comments
19
Years Active
5
Top Authors
#4276
Topic ID

Activity Over Time

2008
21
2009
36
2010
72
2011
109
2012
138
2013
267
2014
208
2015
229
2016
253
2017
300
2018
277
2019
284
2020
248
2021
277
2022
258
2023
305
2024
283
2025
243
2026
27

Keywords

UC MAC CPU IT e.g FOSS OK SSH HTTPS en.m traffic network inspection packets packet vpn inspect tunnel device encrypted

Sample Comments

rcme Sep 14, 2023 View on HN

How are they inspecting your network traffic?

stoperaticless Sep 2, 2024 View on HN

If traffic is encrypted, and there is constant other traffic to same server, then it might be hard to identify.

quiowqiourqwiou Jan 20, 2017 View on HN

exactly. how can one be sure that it doesn't use the network for its own nefarious purposes while hiding its own network activity ?

nafey May 31, 2018 View on HN

How will they monitor encrypted traffic?

rsecora Apr 17, 2022 View on HN

No. Check the concept of Deep packet inspection.https://en.m.wikipedia.org/wiki/Deep_packet_inspection

ROTMetro Sep 1, 2023 View on HN

It's probably using the VPN mechanism to grab traffic for inspection and can't do what it does without that.

perfmode Sep 19, 2016 View on HN

I don't think that'll thwart deep-packet inspection.

tuxcanfly Aug 17, 2012 View on HN

By the same logic, won't they be able to detect SSH tunneled traffic too?

mmhsieh Jan 26, 2020 View on HN

with nation-state resources, are there not traffic analysis options that could work?

jiggunjer Jul 14, 2020 View on HN

Clients can obfuscate traffic though?