Lemon Obrien wrote:
depends on the data you're transporting. I specificaly stayed away from java
cause it was easy to crack...and the data transported, as well as the
protocols, are sensitive.
That's ridiculous. Strong crypto is strong crypto no matter what
implementation language you use. The same applies for good protocol
design--the quality of the design matters far, far more than the
language it is implemented in.
*/Sashidhar Reddy Mukkamalla <[EMAIL PROTECTED]>/* wrote:
Hi Group,
I am trying to develop a p2p app. Can anyone point me some
literature about security issues/concerns with p2p applications in
particular and network programs in general. Any pointers would be
greatly helpful (both introductory and advanced)
Any time spent reading about the fundamental algorithms, technologies
and standards will be time well spent. It will be generally applicable
no matter what type of application you are building or environment you
are building it for.
Whenever I need a refresher on any topic I usually start here:
http://www.cs.auckland.ac.nz/~pgut001/tutorial/index.html
or
http://ospkibook.sourceforge.net/docs/OSPKI-2.4.7/OSPKI-html/ospki-book.htm
and then branch off into google searches from there. Some of the
specific topics are very dated e.g. "Skipjack" but the issues always
remain relevant.
Mike
_______________________________________________
p2p-hackers mailing list
[email protected]
http://lists.zooko.com/mailman/listinfo/p2p-hackers