Consider how enciphering of connections would affect thumbprinting.
a. If the connection contents were enciphered using an end-to-end encipherment protocol, would thumbprinting work? Why or why not?
b. If the connection contents were enciphered using a link encipherment protocol, would thumbprinting work? Why or why not?