> by randomly interspersing flush commands into the data stream (description > and example implementation https://github.com/wnyc/breach_buster)? > It's not perfect but for some use cases better than having no compression at > all. Flushing the stream seems like an application-level thing to do, and not something openssl generally does. It might be better than having no compression at all, the question is do we need compression in openssl at all? :)