the data flow pattern of a call is unique and hard to change. Steady stream of encrypted data is most likely a call
Let's try to get on the same page. What entropy metric do you have in mind?
-
-
example metric finds keys, http://blog.dkbza.org/2007/05/scanning-data-for-entropy-anomalies.html … Far from expert, will be happy to understand what I'm missing.
-
prof Orr Dunkleman referred me to https://people.csail.mit.edu/rivest/Chaffing.txt … with linear AONT http://cacr.uwaterloo.ca/~dstinson/papers/AON.ps …
-
still not convinced it'll work, you still have high entropy MAC, but maybe ratio is good enough, AONT is linear
-
and I'm still amazed prof Dunkelman's answering curious random people from the internet who send him stupid questions
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.