Linked by runjorel on Thu 13th Jan 2011 19:35 UTC
Linux "At the end of 2010, the 'open-source' software movement, whose activists tend to be fringe academics and ponytailed computer geeks, found an unusual ally: the Russian government. Vladimir Putin signed a 20-page executive order requiring all public institutions in Russia to replace proprietary software, developed by companies like Microsoft and Adobe, with free open-source alternatives by 2015."
Thread beginning with comment 457823
To view parent comment, click here.
To read all comments associated with this story, please click here.
RE: Comment by robojerk
by static666 on Fri 14th Jan 2011 06:59 UTC in reply to "Comment by robojerk"
static666
Member since:
2006-06-09

Please enlighten me how that "salty" network engineer would monitor even Skype traffic, for example? Of course, Skype might have nothing to do with "sensitive areas", but how is it different from any other closed source application leaking encrypted traffic into your network?

Edited 2011-01-14 07:02 UTC

Reply Parent Score: 2

RE[2]: Comment by robojerk
by Laurence on Fri 14th Jan 2011 09:39 in reply to "RE: Comment by robojerk"
Laurence Member since:
2007-03-26

Please enlighten me how that "salty" network engineer would monitor even Skype traffic, for example? Of course, Skype might have nothing to do with "sensitive areas", but how is it different from any other closed source application leaking encrypted traffic into your network?


Because anything on a non-standard port or even (and depending on the port) using a non-standard protocol on a standardised port would be firewalled.

You can even go further and blacklist outgoing IPs or even whitelist "safe" IPs for outgoing connections.

.....and these are just using basic network firewall tools.

Reply Parent Score: 3

RE[3]: Comment by robojerk
by Nth_Man on Fri 14th Jan 2011 10:14 in reply to "RE[2]: Comment by robojerk"
Nth_Man Member since:
2010-05-16

"Please enlighten me how that "salty" network engineer would monitor even Skype traffic, for example? Of course, Skype might have nothing to do with "sensitive areas", but how is it different from any other closed source application leaking encrypted traffic into your network?


Because anything on a non-standard port or even (and depending on the port) using a non-standard protocol on a standardised port would be firewalled.
"
It's clear that you cand send encrypted data through standard ports, through standard protocols.

"Steganography" is such a clear example that anyone can understand it, for example a program can embed secrets in a simple email! Inside typical images!

Reply Parent Score: 1