Hacker News new | past | comments | ask | show | jobs | submit login

Network engineers can use it to monitor network performance.



Which they could presumably also do by injecting their own packets, not snooping on everyone else's?


I don't know, how would you inject packets into an encrypted end to end connection?

Passive observation of traffic is a useful network performance monitoring technique.


How though, because surely it includes the time outside the observers network? And if they only want to monitor performance inside their network nothing so them from using an out of band system, or even adding their own timing footers to packets.





Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: