Tracing traitors
l
Classify recovered clip’s packets -
ACCEDBADABCD
l
Simulate network behaviour during
that period
l
Calculate users and routers who
individually or in collusion are most
likely to have produced clip