Boston Linux & Unix (BLU) Home | Calendar | Mail Lists | List Archives | Desktop SIG | Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings
Linux Cafe | Meeting Notes | Blog | Linux Links | Bling | About BLU

BLU Discuss list archive


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

An unusual Instant Messenger question



On Fri, Jan 10, 2003 at 03:08:41PM -0500, David Kramer wrote:
> On Friday 10 January 2003 02:44 pm, Nathan Meyers wrote:
> 
> > My approach to this (which isn't pretty :-) would be to interpose a relay
> > - such as a Jabber server - through which your progeny would connect,
> > and hack that relay to take over the protocol stream to do a sign-off.
> > This isn't a trivial problem - there's some reverse engineering to be
> > pulled off, although all the necessary protocol knowledge is probably
> > embedded somewhere in Jabber code.
> >
> > This is form of man-in-the-middle attack, and will look great on your
> > hacking credentials.
> 
> ... And would almost certainly be a DMCA violation, if you care about that 
> sort of thing.

And we all do :-).

Has DMCA really ventured into protection of network protocols? I
haven't heard those initials uttered in the ongoing Microsoft/AOL IM
interoperability pissing contest.

Nathan Meyers
nmeyers at javalinux.net




BLU is a member of BostonUserGroups
BLU is a member of BostonUserGroups
We also thank MIT for the use of their facilities.

Valid HTML 4.01! Valid CSS!



Boston Linux & Unix / webmaster@blu.org