|Registered||3 weeks ago|
|Last Visited||5 months ago|
|torfan 3 weeks ago|
So let's consider this attack model:
The enemy can surveil all traffic at an internet-provider $ISP, therefore all traffic that goes from a $ISP-Customer to the $ISP (or any other customer) and back.
Let's also assume the enemy can surveil all in- and outgoing traffic from/to a specific ser