acho que vale sim... Primeiro porque eh uma no-profit. Segundo porque eh uma 
consultoria que nao requer implementacao, somente redaçao de um (ou 
mais)documento(s) guia que responda no minimo aos requisitos citados e permita 
(ou de sugestao de como melhor adaptar) o procedimento tecnico relatado.
E contando que quem faz esse tipo de trabalho *com certeza* nao trabalha 1 mes 
full-time pra fazer isso.... acredito que o pagamento eh mais do que justo.

abs,
giovani

>*********** REPLY SEPARATOR ***********
>
>On 16/05/2007 at 9.51 Pablo Sánchez wrote:
>We have allocated 1500-2500 euros for this activity.
>
>Isso lá vale algo? Digo... estão pagando isso para consultor em segurança
>aí fora? :-/ Achei que valorizassem mais esse tipo de profissional.
>
>
>2007/5/16, Giovani Spagnolo < [EMAIL PROTECTED]>:
>Ola pessoal, esta fundacao esta procurando profissionais de alta segurança
>de servidor, web e dados em linux para uma consultoria.
>Indispensavel ingles fluente.
>Abstract da proposta abaixo com info de contato.
>
>abs,
>Giovani Spagnolo
>
>
>-------- Messaggio Originale -------- Oggetto: Open Call (RFP) for
>Telematics Security Consulting Services
>Data: Tue, 15 May 2007 16:27:27 +0200
>Da: rufo guerreschi <[EMAIL PROTECTED]>
>A: fiorella de cindio, Marco Bodrato, Marco Calamari, coughlan, Stefano
>Maffulli, "lv.mancini", Rebecca Mercuri, "Benj. Mako Hill" , Todd Davies,
>Samir Mehta , Mazin Ramadan , Henry Poole , Fabrizio Capobianco, Giovani
>Spagnolo
>
>Please,
>kindly forward this Open Call to security consultants that you think may
>be both interested and capable to perform the following required services.
>
>
>Thanks,
>Rufo Guerreschi
>
>
>----------------------
>Open Call (RFP) for  
>Telematics Security Consulting Services 
>
>
>Dear prospective consultant,
>
>
>please find below an RFP for consulting services to help us devise a model
>of collective security that can be replicated by all providers of
>telematic services using exclusively FLOSS software.
>
>
>BUDGET
>We have allocated 1500-2500 euros for this activity. Also, as part of the
>contract we may devise ways to publicly recognize the chosen consultant's
>contribution within the foundation website, or its technical advisory
>board.
>
>
>TIMELINE
>At least part of this activity need to be performed before June 5th, as we
>will be confronting criticism by many experts during a public event. 
>Please, send proposal before May 18th. Proposal can be very short,
>mentioning a number of hours to be performed and any relevant work done.
>
>
>BACKGROUND
>The Telematics Freedom Foundation (TFF) is working on a system
>architecture and hosting requirements for its web service, do2gether.org,
>that wants to establish a model by which the actual nature, and therefore
>security and privacy characteristics, of a telematics service can be 
>democratically controlled by its users. 
>We have devised draft Download Agreements and Hosting Requirements that
>should guarantee, to a very very high level, to a user of a such service,
>that the software and hardware on the machine providing the service are
>what the service provider says they are.
>We are assuming that the user is running on his PC (installed or on a live
>CD) a off-the-shelf and properly configured high-security flavor of
>Gnu/linux and basic FLOSS web browser. The client should preferably use a
>(modified if necessary) widely available web broswer such as Firefox or
>Opera.
>We are assuming that physical access security to server cages is
>"perfect". The only remote connection to the servers is by users of the
>web service through a web browser. All administration will be done
>in-person in front of the servers.
>
>
>EXPECTED SERVICES
>We have full control on the Live CD for the clients, as well as all the
>software on the web server and the other servers on the cage. All software
>need to be available under a FLOSS license, or at least their code should
>be audit-able (and compilable) by any user on request.
>
>
>What kind of FLOSS software can be installed on both the client and the
>server to best prevent man-in-the-middle attacks? To what degree can we
>prevent them?
>Can 512-bit encryption be put in place? Is that crackable by governments,
>militaries or well other well-funded and equipped entities?
>How can we prevent (and to what degree) that the user may think they are
>using The Server, while instead they have been redirected to a fraudulent
>server?
>How can we best prevent (and to what extent?) intrusion in the servers?
>How can we best detect (and to what extent?) intrusion in the servers and
>track what such intrusion caused?
>
>
>(Optional) Can we (and how) prevent that people with illegal access to the
>users web traffic with his ISP can discover that they have access The
>Server?
>(Optional) To what extent can we prevent denial-of service attacks?
>
>
>If interested, call me for any questions at +39 335 7545620
>
>
>
>------------------------------
>Rufo Guerreschi
>[EMAIL PROTECTED]
>cell/sms +393357545620
>skype: rguerreschi
>http://www.telematicsfreedom.org
>http://blog.telematicsfreedom.org
>
>
>*********** END FORWARDED MESSAGE *********** 
>
>_______________________________________________
>PSL-Brasil mailing list
>[EMAIL PROTECTED] 
>http://listas.softwarelivre.org/mailman/listinfo/psl-brasil
>Regras da lista: 
>http://twiki.softwarelivre.org/bin/view/PSLBrasil/RegrasDaListaPSLBrasil

_______________________________________________
PSL-Brasil mailing list
PSL-Brasil@listas.softwarelivre.org
http://listas.softwarelivre.org/mailman/listinfo/psl-brasil
Regras da lista: 
http://twiki.softwarelivre.org/bin/view/PSLBrasil/RegrasDaListaPSLBrasil

Responder a