|
|
|
|
|
|
|
|
|
|
|
|
|
|
l |
CRN traffic
may be identifiable
|
|
|
|
– |
Static set of
protocols a weakness
|
|
|
l |
Mere
membership may be incriminating
|
|
|
|
– |
Only
identification may be necessary, not
|
|
|
eavesdropping
|
|
|
|
– |
Last link
vulnerable: mercy of ISP
|
|
|
l |
Users on
restricted networks cannot
|
|
|
participate
|
|
|
|
– |
But special
techniques can get traffic through
|
|
firewalls,
proxies, etc.
|
|