VPN to a known trusted network that I run. This is the only way I can
control my path to the internet. Protocol or application specific
encryption is a hassle and often requires the other end to be using the
same system which isn't practical, IMHO.

In my case I sometimes use IPSEC VPNs or if i am benind a NAT that dosen't
have IPSEC passthrough I use SSH tunnels. SSH tunnels are nice since I can
send my sensitive traffic through the tunnel and things like web browsing
can go directly out w/o ssh wrapper. This makes bandwith useage more
effcient.

The only thing that this dosen't provide for is end to end encryption. The
person I am IMing to could have snooping on their local net. However, it
protects my traffic from being sniffed by other clients hanging off the
access point or local net. In general I feel this is suffcient security.

-James

On Wed, 12 May 2004, Frank Keeney wrote:

>
> As we all know, when using open 802.11b hotspots, by default all traffic is
> unencrypted. Exceptions are SSL encrypted (https) web sites and other
> applications that use encryption. Everything else is in the clear.
>
> If you use most any of the popular Instant Messaging clients, your login,
> password and text of all of your chatting is sent in the clear. With various
> programs, and many are free, anyone can capture this information. This issue
> is not unique to wireless. If you use IM at work, it's very possible that
> your corporate IDS (Intrusion Detection System) is detecting and possibly
> logging all of the content of your IM session. The same goes for using IM
> for business purposes. Many people use IM for business communications all
> over the world. How do you know some foreign/domestic organization is not
> eavesdropping on your chat?
>
> A Google search turns up interesting information on this problem:
>
> Independent analysis of Trillian encryption:
> http://www.sans.org/rr/papers/20/1116.pdf
>
> AIM IM Encryption:
> http://enterprise.aim.com/products/aim/personalcerts/
> http://www.aimencrypt.com
>
> Hushmail Messenger:
> https://www.hushmail.com
>
> So far I like the Hushmail product. As far as I know, they have a good
> reputation for security.
>
> Is anyone else using any tools to protect their Instant Messaging?
>
>
> Frank Keeney
>
>
> ----------------------------------
>
> IM: Hush Messenger (Secure): [EMAIL PROTECTED] Yahoo: wlanparts
> AIM: wlanparts, MSN: [EMAIL PROTECTED]
> VOIP: Skype: wlanparts, FWD: 289372
>

Reply via email to