Path: ...!weretis.net!feeder9.news.weretis.net!tncsrv06.tnetconsulting.net!tncsrv09.home.tnetconsulting.net!.POSTED.198.18.1.11!not-for-mail From: Grant Taylor Newsgroups: comp.misc Subject: Re: [LINK] Calling time on DNSSEC? Date: Wed, 4 Dec 2024 19:19:55 -0600 Organization: TNet Consulting Message-ID: References: <67464f37@news.ausics.net> Mime-Version: 1.0 Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit Injection-Date: Thu, 5 Dec 2024 01:19:55 -0000 (UTC) Injection-Info: tncsrv09.home.tnetconsulting.net; posting-host="198.18.1.11"; logging-data="21715"; mail-complaints-to="newsmaster@tnetconsulting.net" User-Agent: Mozilla Thunderbird Content-Language: en-US In-Reply-To: Bytes: 1771 Lines: 18 On 12/4/24 02:39, Richard Kettlewell wrote: > Better than nothing, although in many cases I’d expect that traffic > analysis could be used to narrow down which site was being visited > even without name information being available. Yes, traffic analysis can infer and / or interfere with things. There's also domain fronting. }:-) > If there’s multiple sites served by a single IP address then the > attack can just indiscriminately block all of them. Encrypting name > information can’t prevent that. Quite ;-) -- Grant. . . .