*All* of the Logjam attack scenarios involve a TLS session that waits much longer than normal user will wait for session estab.
-
-
@BRIAN_____@tqbf How would attacker differentiate that request? -
@t3hub3rk1tten@tqbf Traffic analysis and/or SNI are two ways, off the top of my head.
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.