*All* of the Logjam attack scenarios involve a TLS session that waits much longer than normal user will wait for session estab.
-
-
Replying to @BRIAN_____
@tqbf Also, the attacker can attack a connection that the user won't notice the added latency for, e.g. tracking pixel load or AJAX refresh.1 reply 0 retweets 1 like -
Replying to @BRIAN_____
@BRIAN_____@tqbf How would attacker differentiate that request?1 reply 0 retweets 0 likes
Replying to @t3hub3rk1tten
@t3hub3rk1tten @tqbf Traffic analysis and/or SNI are two ways, off the top of my head.
5:22 PM - 22 May 2015
0 replies
0 retweets
0 likes
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.