First page Back Continue Last page Summary Graphic
Defeating the monitoring
Cryptography defeats network-based monitoring of content - not traffic patterns
Anonymous redirection services combined with cryptography make network-based location monitoring far more difficult
Detection and disabling the monitoring mechanisms is often feasible
Exploitation of monitors can be done by a smart attacker to defeat or exploit its use
Notes: