Some Problems Facing CRNs
l CRN traffic may be identifiable
Static set of protocols a weakness
l Mere membership may be incriminating
Only identification may be necessary, not
eavesdropping
Last link vulnerable: mercy of ISP
l Users on restricted networks cannot
participate
But special techniques can get traffic through
firewalls, proxies, etc.