On Monday 03 April 2006 17:00, Lee Revell wrote:
On Mon, 2006-04-03 at 22:17 +0200, Jacob wrote:
But I see a problem with skype's b0rken
encryption (they seem to use
the same RC4 sequence twice, with a lot of known plain text bytes in
the first run, so hacking this is straight forward) and the
possibility for others to make their computer a supernode which
might route my call if I am behind a firewall.
For more details see:
http://www.golem.de/0603/44146.html (german)
http://www.secdev.org/conf/skype_BHEU06.handout.pdf (link taken
from above document, very interesting)
Yup, I've read that doc - I'm not a crypto expert so can't really
comment.
Oh well, I guess I have to try the AC97 mic port on the back of the
card, and if that fails, the onboard Via sound.
Hmm, I do have an old hub behind my DSL router, maybe I have to bypass
it...
I'm not doing anything unusual to my firewall or router at all Lee.
And I am using skype occasionally, with it using the onboard nforce
version of the av97 chipset. And except for needing to use
'skype_dsp_hijacker -2nd' in the icon to launch it, its all in
the /etc/modules.conf file. I think maybe you even helped me set it up
originally last fall. Do I need to copy that back to the list again?
Lee
--
Cheers, Gene
People having trouble with vz bouncing email to me should add the word
'online' between the 'verizon', and the dot which bypasses vz's
stupid bounce rules. I do use spamassassin too. :-)
Yahoo.com and AOL/TW attorneys please note, additions to the above
message by Gene Heskett are:
Copyright 2006 by Maurice Eugene Heskett, all rights reserved.