lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sun, 29 Oct 2006 16:20:04 +0100 From: "Tyop?" <tyoptyop@...il.com> To: full-disclosure@...ts.grok.org.uk Subject: Re: [ Capture Skype trafic ] On 10/29/06, Brian Eaton <eaton.lists@...il.com> wrote: > On 10/28/06, gabriel rosenkoetter <gr@...ipsed.net> wrote: > > On Sat, Oct 28, 2006 at 11:24:40AM +0200, Cedric Blancher wrote: > > > Have you ever header of Skype API that basicly allows two application to > > > communicate on top of Skype network, thus inheriting Skype resilience, > > > encryption, obfuscation and firewall punching capapbilities ? > > > > I don't see how this isn't still an HR problem. > > It is an HR problem. It's also an IT problem. Neither group can > solve the issue without help from the other. And both groups need > buy-in from the rest of the organization if they expect to make the > solution stick. Good troll. I think that filtering a program like this, HR or IT, will prevent a lot of problems, because of his closing-encrypted-nonRE source. I find this closed politic-protocol-program too dangerous to let it run in my network. I need to match it on a gate, and I haven't found any "usefull" informations. Thx to the list for the discussion. -- Tyop? "And excuse my english." _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists