Question: The current situation of traffic analysis is similar to the one of cryptography in the late 1960’s. Back then, it was known that cryptography existed but not much cryptologic expertise was publicly available. This has changed dramatically. Meanwhile, crypto products can be used by virtually everyone. Cryptography is a very active field of academic research and a huge business. Do you think we will see a similar development in traffic analysis countermeasures?
Wessel: I’m not sure. Traffic analysis countermeasures already is a topic of academic study. If successful countermeasures to hide data would become available for the general public to the extend we now routinely apply cryptography, this would be a major setback for law enforcement but a disaster for the the Googles and the Facebooks of our beloved Internet.
Question: Although IT security is a popular topic in the media, we rarely hear of companies reading each other’s’ mails or to listening to each other’s’ phone calls. What about traffic analysis?
Wessel: As I said, it’s easier than analyzing the content of communication. It is just a matter of getting the (meta)data. Between companies, that is not easy to do legally. For national agencies, industrial espionage is almost certain to include traffic analysis.
Thank you very much to Bart for this interview!
Follow @KlausSchmeh
Further reading: A fascinating report of Enigma’s contemporary witness, Max Rüegger
Kommentare (1)