has anyone considered this simple workaround for BREACH and
gzip-compression, i.e. randomly interspersed flush()-es during
It would be compatible with all clients, and should be fairly easy to
implement in nginx (for nginx hackers).
Of course, it doesn’t prevent BREACH attacks, but it makes them much
PS: yes, I’m aware that BREACH should also be prevented in the
Posted at Nginx Forum: