Linked by runjorel on Thu 13th Jan 2011 19:35 UTC
Linux "At the end of 2010, the 'open-source' software movement, whose activists tend to be fringe academics and ponytailed computer geeks, found an unusual ally: the Russian government. Vladimir Putin signed a 20-page executive order requiring all public institutions in Russia to replace proprietary software, developed by companies like Microsoft and Adobe, with free open-source alternatives by 2015."
Permalink for comment 457857
To read all comments associated with this story, please click here.
RE[3]: Comment by robojerk
by Nth_Man on Fri 14th Jan 2011 10:14 UTC in reply to "RE[2]: Comment by robojerk"
Nth_Man
Member since:
2010-05-16

"Please enlighten me how that "salty" network engineer would monitor even Skype traffic, for example? Of course, Skype might have nothing to do with "sensitive areas", but how is it different from any other closed source application leaking encrypted traffic into your network?


Because anything on a non-standard port or even (and depending on the port) using a non-standard protocol on a standardised port would be firewalled.
"
It's clear that you cand send encrypted data through standard ports, through standard protocols.

"Steganography" is such a clear example that anyone can understand it, for example a program can embed secrets in a simple email! Inside typical images!

Reply Parent Score: 1