If the content of packets isn’t available until the target machine, doesn’t that eliminate any way of limiting damaging traffic and put it all on the target machine to withstand?
I don’t think so, although it would require your DoS protection service to have your private keys, effectively pretending to be the destination machine. But that pretty much happens anyway.
If the content of packets isn’t available until the target machine, doesn’t that eliminate any way of limiting damaging traffic and put it all on the target machine to withstand?
I don’t think so, although it would require your DoS protection service to have your private keys, effectively pretending to be the destination machine. But that pretty much happens anyway.
Could this be another application for homomorphic encryption?