This means that it is extremely difficult to hold intruders accountable for their actions.
The idea behind thumbprinting is to notice that the content of the connections at different points in the chain are the same - if an {\it ls} command is given by the attacker, those two characters (and their echoes) traverse the entire length of the chain. Similarly, the target machine's response travels through every connection involved. Thus, if small summaries of the content of the connections were kept at two points, they could later be compared to establish whether or not those two formed links in the same chain. One can think of such a summary as (loosely) a checksum of the data in the connection (or some piece of it). In practice these summaries are formed by passive monitoring of network traffic.
We have characterized the properties required of such summaries, and explored a class of linear algorithms which have these properties. We have performed experiments which have preliminarily established the feasibility of the method.