Yikes! Decompile is hardly a security issue. We obfuscate Java all the time to prevent the random prying eye, but C and all other languages are just as easily hacked. You can not hide references to libraries and such in either language. There is no such thing as code security, just obscurity. Daniel Brookshier office 972-422-5261 cell 214-207-6614
On Aug 15, 2006, at 3:29 PM, Lemon Obrien wrote: you've never decompiled java then...i have...especially if i wanted to changed how something worked.
Mike Duigou <[EMAIL PROTECTED]> wrote: Lemon Obrien wrote: > depends on the data you're transporting. I specificaly stayed away from java cause it was easy to crack...and the data transported, as well as the protocols, are sensitive.
That's ridiculous. Strong crypto is strong crypto no matter what implementation language you use. The same applies for good protocol design--the quality of the design matters far, far more than the language it is implemented in.
>> */Sashidhar Reddy Mukkamalla /* wrote: >> >> Hi Group, >> I am trying to develop a p2p app. Can anyone point me some >> literature about security issues/concerns with p2p applications in >> particular and network programs in general. Any pointers would be >> greatly helpful (both introductory and advanced)
Any time spent reading about the fundamental algorithms, technologies and standards will be time well spent. It will be generally applicable no matter what type of application you are building or environment you are building it for.
Whenever I need a refresher on any topic I usually start here:
http://www.cs.auckland.ac.nz/~pgut001/tutorial/index.html
or
http://ospkibook.sourceforge.net/docs/OSPKI-2.4.7/OSPKI-html/ospki-book.htm
and then branch off into google searches from there. Some of the specific topics are very dated e.g. "Skipjack" but the issues always remain relevant.
Mike
_______________________________________________ p2p-hackers mailing list [email protected] http://lists.zooko.com/mailman/listinfo/p2p-hackers
You don't get no juice unless you squeeze Lemon Obrien, the Third._______________________________________________ p2p-hackers mailing list |
_______________________________________________
p2p-hackers mailing list
[email protected]
http://lists.zooko.com/mailman/listinfo/p2p-hackers