Home
| Calendar
| Mail Lists
| List Archives
| Desktop SIG
| Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings Linux Cafe | Meeting Notes | Linux Links | Bling | About BLU |
On Fri, Jan 10, 2003 at 03:08:41PM -0500, David Kramer wrote: > On Friday 10 January 2003 02:44 pm, Nathan Meyers wrote: > > > My approach to this (which isn't pretty :-) would be to interpose a relay > > - such as a Jabber server - through which your progeny would connect, > > and hack that relay to take over the protocol stream to do a sign-off. > > This isn't a trivial problem - there's some reverse engineering to be > > pulled off, although all the necessary protocol knowledge is probably > > embedded somewhere in Jabber code. > > > > This is form of man-in-the-middle attack, and will look great on your > > hacking credentials. > > ... And would almost certainly be a DMCA violation, if you care about that > sort of thing. And we all do :-). Has DMCA really ventured into protection of network protocols? I haven't heard those initials uttered in the ongoing Microsoft/AOL IM interoperability pissing contest. Nathan Meyers nmeyers at javalinux.net
BLU is a member of BostonUserGroups | |
We also thank MIT for the use of their facilities. |