<!DOCTYPE html>
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
</head>
<body>
<div class="moz-cite-prefix">On 3/18/24 11:31, Christian Huitema
wrote:<br>
</div>
<blockquote type="cite"
cite="mid:6fa789c1-8966-42db-9b01-92dde856df7b@huitema.net">The
first step is indeed to avoid providing too much information
through packet lengths, by standardizing to just a few lengths.
The next step is to inject chaff to try to break analyzes of
packet timing.</blockquote>
<p>Please allow me to enthusiastically agree, while also being a bit
contrarian and suggest the <i>real</i> first step is to quit
being comforted by the tidy division of responsibility offered the
OSI network layers. TLS is mostly down at the layer 4 (transport),
and it has handled all the encryption stuff down there, so up at
layer 7 (application) we are safe! Right?</p>
<p>Traffic analysis is really a kind of metadata analysis, and an
encryption layer can never magically fix resulting security
problems. They have to be addressed by application folk, who don't
care.<br>
</p>
<p>The whole way we build software these days (maximum feature
velocity by configuring big complex cloud things to work with
other big complex cloud things, repeat ad infinitum) seems
intended to not build anything secure. We still can't even manage
to avoid leaving data in the clear on the public internet.</p>
<p>-kb, the Kent who is turning into an old crank.<br>
</p>
<br>
</body>
</html>