Tracing traitors
l Classify recovered clip’s packets -
ACCEDBADABCD
l Simulate network behaviour during
that period
l Calculate users and routers who
individually or in collusion are most
likely to have produced clip