View Single Post
Old 08-24-2006, 03:47 AM   #12
TadW
Uebermensch
TadW ought to be getting tired of karma fortunes by now.TadW ought to be getting tired of karma fortunes by now.TadW ought to be getting tired of karma fortunes by now.TadW ought to be getting tired of karma fortunes by now.TadW ought to be getting tired of karma fortunes by now.TadW ought to be getting tired of karma fortunes by now.TadW ought to be getting tired of karma fortunes by now.TadW ought to be getting tired of karma fortunes by now.TadW ought to be getting tired of karma fortunes by now.TadW ought to be getting tired of karma fortunes by now.TadW ought to be getting tired of karma fortunes by now.
 
TadW's Avatar
 
Posts: 2,583
Karma: 1094606
Join Date: Jul 2003
Location: Italy
Device: Kindle
Please let me repeat: What I know is not a security problem, but it is the basic pattern how the iLiad communicates with the iDS server.

I would basically describe the protocol used. Think about all the Yahoo! IM chat clones out there. Are they a security threat to Yahoo? No. But they use the underlying Yahoo! IM protocol to establish connections through the Yahoo network.

As ath pointed out, some people might start digging around the protocol to find possible security holes and exploits. But this is always the case when information is revealed. As soon as iRex will release the iLiad SDK and the source files, new information is out, and likewise people will examine these files for possible exploits.

I don't see a reason to talk to the iRex guys, because it's nothing new to them - they should know best how the protocol works, and I have nothing else to add to it.

Last edited by TadW; 08-24-2006 at 04:06 AM.
TadW is offline   Reply With Quote