Tzahi Fadida wrote:
i disagree, since as long that there will be free access to internetForgive me for erasing your example. I think you have misunderstood what I said.
nodes, i.e: unlike some cellular companies that provide WAP services
do(they only allow you to surf their internal wap pages).
you can find a way to access these resources, since inside the
definition of "allow a b c" you allow side effects to infiltrate which
is at the heart of the internet technology makeup.
If I understand your point correctly, you are trying to say that any given policy, assuming it is slightly permissive, can be used to relay ANY information, assuming cooporation from both sides of the communication. With that point I agree.
My point, however, is that any *given* method of overloading one (presumably unwanted) method of communication over another (presumably wanted, or at least allowed) can be detected on the way, assuming enough resources (unless encryption is used with the legitimate method, in which case all bets are off).
Now, if you look at the two points raised, you can easily see that for large deployment P2P clients and instant messangers, there is a race. It consist of "security" technologies adapting to a given protol to block it, "bypass" technologies bypass to that specific enhanced control, to bypass it, and go back to step one. This is what I called in my previous email "the race is on".
Shachar
=================================================================
To unsubscribe, send mail to [EMAIL PROTECTED] with
the word "unsubscribe" in the message body, e.g., run the command
echo unsubscribe | mail [EMAIL PROTECTED]