_____ From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Adam Fisk Sent: Friday, August 31, 2007 11:11 AM To: theory and practice of decentralized computer networks Subject: Re: [p2p-hackers] Best NAT traversal options
Keep in mind STUN is a pretty basic protocol that doesn't do much work. ICE does the real heavy lifting in the standards-based NAT traversal approach, although it leverages STUN all over the place. Everyone almost surely uses a STUN-like protocol, as you need to know your public address in any scheme. Actually, you don't :) Alex
_______________________________________________ p2p-hackers mailing list [email protected] http://lists.zooko.com/mailman/listinfo/p2p-hackers
