▲ | ryao 19 hours ago | |||||||
I meant it is difficult relative to fingerprinting TLS and HTTP. The information is not exported by the berkeley socket API unless you use raw sockets and implement your own userland TCP stack. | ||||||||
▲ | sneak 9 hours ago | parent [-] | |||||||
Couldn’t you just monitor the inbound traffic and associate the packets to the connections? Doing your own TCP seems silly. | ||||||||
|