Hmnn...OK, I admit it, I want to see your code.
On 8/31/07, Alex Pankratov <[EMAIL PROTECTED]> wrote: > > ------------------------------ > *From:* [EMAIL PROTECTED] [mailto: > [EMAIL PROTECTED] *On Behalf Of *Adam Fisk > *Sent:* Friday, August 31, 2007 11:11 AM > *To:* theory and practice of decentralized computer networks > *Subject:* Re: [p2p-hackers] Best NAT traversal options > > Keep in mind STUN is a pretty basic protocol that doesn't do much work. > ICE does the real heavy lifting in the standards-based NAT traversal > approach, although it leverages STUN all over the place. > > Everyone almost surely uses a STUN-like protocol, as you need to know your > public address in any scheme. > > Actually, you don't :) > > Alex > > _______________________________________________ > p2p-hackers mailing list > [email protected] > http://lists.zooko.com/mailman/listinfo/p2p-hackers > >
_______________________________________________ p2p-hackers mailing list [email protected] http://lists.zooko.com/mailman/listinfo/p2p-hackers
