CyberWire Daily cover image

Root access to the great firewall. [Research Saturday]

CyberWire Daily

00:00

Implications for Enterprise Monitoring

Daniel suggests how defenders can use leak-derived fingerprints to distinguish firewall-processed traffic from circumvention.

Play episode from 19:47
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app