top | item 6945180

(no title)

skloubkov | 12 years ago

Isn't it better to overlay this whole security level over existing infrastructure (Skype or something) and take advantage of that?

Seems like this new protocol wouldn't work too well with offline messages, storing previous conversations etc.

Also would be easy to trace back to IP's and find origins of the messages. They should've designed a system so that messages would be hidden in echo/ping commands. That way if someone is monitoring all the messages between nodes they wouldnt be able to distinguish actual traffic.

discuss

order

No comments yet.