Ass Hat
Home
News
Events
Bands
Labels
Venues
Pics
MP3s
Radio Show
Reviews
Releases
Buy$tuff
Forum
  Classifieds
  News
  Localband
  Shows
  Show Pics
  Polls
  
  OT Threads
  Other News
  Movies
  VideoGames
  Videos
  TV
  Sports
  Gear
  /r/
  Food
  
  New Thread
  New Poll
Miscellaneous
Links
E-mail
Search
End Ass Hat
login

New site? Maybe some day.
Username:
SPAM Filter: re-type this (values are 0,1,2,3,4,5,6,7,8,9,A,B,C,D,E, or F)
Message:


UBB enabled. HTML disabled Spam Filtering enabledIcons: (click image to insert) Show All - pop

b i u  add: url  image  video(?)
: post by the_reverend at 2013-08-15 11:17:32
death-metal said[orig][quote]
ark said[orig][quote]
they could find the physical address of my router, through that or process of elimination


Traffic fingerprinting as a result of deep packet (anal) inspection has vastly improved. I don't know if they'd apply it, for business reasons (if your customers are mildly ripping you off, but paying for the service because they can rip you off, then it might make sense to tolerate it).
Your knowledge of traffic profile is about a decade behind at this point, I'm guessing. Heck, I can barely keep up with it all... but they use signatures a lot not. Signatures can be made of anything basically. I know there are line-rate analyzers that will look for signature of anything and then can take your traffic and do whatever they want to do to it with policy based connections.

There are things I've seen from my company in the past few years.... scary things.

Neither of that is important though there. CAS works by invading the p2p networks.
[default homepage] [print][8:51:17am Apr 27,2024
load time 0.02084 secs/10 queries]
[search][refresh page]