ICE is used by sony-playstation, they are getting their ass kicked by microsoft 
cause it's easier to connect with other people and play games with using their 
stuff.
   
  basically, too. it is not that hard to get the global ip address of any 
client (they connect to your server, you read the infor from the socket); and 
it's not too hard to compare port numbers (connect to another server with 
seperate ip address) to see what is happening at the firewall(s) level.
   
  don't be fooled by crap-ware standards written by phd students who've never 
had a real programming job...think about it, if we did, we'd all use XML in our 
udp to move data from one computer to another.
   
  I think if anybody should make standards for this, it should be us, on this 
list. I know there are other developrs on this list, some famous, who've done 
it before and know how to make it better.
   
  i know i'm damn close, but currently working of a new db schema, code.
   
  i personally think the industry has no clue as to why this would be important 
to have, as a standard standard, which works. mainly its controlled by large 
companies, like mickysoft and apple, that would rather close off their 
customer's computers, than give them the freedom to communicate. 
   
  Do you honestly think we need all the security/virus protection crap whne 99% 
of virsuses hijack the browser, come-in through email or word doc macros? The 
only APIs that are hidden and open to attach are mickysoft's; and that is cause 
they suck....and or, are controlling fear to pump up the virus software 
market....notice how no new software has been released since the late 
90s...that is, for sale....virus software is the only thing being pusshed.
   
  anyway...total rant...and maybe i'm crazy, but i write code...and been to, 
worked for, mickysoft and apple.
   
  I'm totally willing to help...but as mentioned before, once you have all the 
information, getting two computer behind firewalls to connect is a pain in the 
ass, and is mostly black-magic.
   
  lemon
  
Alex Pankratov <[EMAIL PROTECTED]> wrote:
        
---------------------------------
  From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Adam Fisk
Sent: Friday, August 31, 2007 11:11 AM
To: theory and practice of decentralized computer networks
Subject: Re: [p2p-hackers] Best NAT traversal options
    
  Keep in mind STUN is a pretty basic protocol that doesn't do much work.  ICE 
does the real heavy lifting in the standards-based NAT traversal approach, 
although it leverages STUN all over the place.

Everyone almost surely uses a STUN-like protocol, as you need to know your 
public address in any scheme.  
  Actually, you don't :)
   
  Alex 
_______________________________________________
p2p-hackers mailing list
[email protected]
http://lists.zooko.com/mailman/listinfo/p2p-hackers



You don't get no juice unless you squeeze
Lemon Obrien, the Third.

http://www.tamago.us
_______________________________________________
p2p-hackers mailing list
[email protected]
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Reply via email to