[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <985b1a3d0610290720k67bf4c4ye440bb7b19d15c83@mail.gmail.com>
Date: Sun, 29 Oct 2006 16:20:04 +0100
From: "Tyop?" <tyoptyop@...il.com>
To: full-disclosure@...ts.grok.org.uk
Subject: Re: [ Capture Skype trafic ]
On 10/29/06, Brian Eaton <eaton.lists@...il.com> wrote:
> On 10/28/06, gabriel rosenkoetter <gr@...ipsed.net> wrote:
> > On Sat, Oct 28, 2006 at 11:24:40AM +0200, Cedric Blancher wrote:
> > > Have you ever header of Skype API that basicly allows two application to
> > > communicate on top of Skype network, thus inheriting Skype resilience,
> > > encryption, obfuscation and firewall punching capapbilities ?
> >
> > I don't see how this isn't still an HR problem.
>
> It is an HR problem. It's also an IT problem. Neither group can
> solve the issue without help from the other. And both groups need
> buy-in from the rest of the organization if they expect to make the
> solution stick.
Good troll. I think that filtering a program like this, HR or IT, will
prevent a lot of problems, because of his closing-encrypted-nonRE source.
I find this closed politic-protocol-program too dangerous to let it run in
my network.
I need to match it on a gate, and I haven't found any "usefull" informations.
Thx to the list for the discussion.
--
Tyop?
"And excuse my english."
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists