I think this might be a very interesting topic. I'm unsure as to what has or has not been investigated though... should I concentrate my analysis more on D-Bus, Telepathy, or how the presence service implements these and the logical paths the system takes to get to the service? If I should focus more on the implementation, which files/directories should I look at?
Thanks again! Jeremy Polychronis Ypodimatopoulos wrote: > Our presence algorithms should be evaluated in terms of security > (impersonation, dos, mim, etc). A list of vulnerabilities should be > analyzed and solutions should be proposed. More details will follow if > interested. > > p. > > Jeremy Flores wrote: >> Hi all, >> >> Does anyone know of any security-related projects that need to be >> worked on for OLPC? I am taking a computer and network security >> class, and I was thinking that Bitfrost would be an interesting topic >> for a final project we have. I poked around the wiki, but I couldn't >> find a security todo list. >> >> Thanks! >> Jeremy Flores >> >> [EMAIL PROTECTED] >> >> _______________________________________________ >> Devel mailing list >> Devel@lists.laptop.org >> http://lists.laptop.org/listinfo/devel >> > _______________________________________________ Devel mailing list Devel@lists.laptop.org http://lists.laptop.org/listinfo/devel