From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on polar.synack.me X-Spam-Level: X-Spam-Status: No, score=-0.3 required=5.0 tests=BAYES_00,TRACKER_ID, UNCLOSED_BRACKET autolearn=no autolearn_force=no version=3.4.4 Path: border1.nntp.ams3.giganews.com!border1.nntp.ams2.giganews.com!border2.nntp.ams2.giganews.com!border4.nntp.ams.giganews.com!border2.nntp.ams.giganews.com!nntp.giganews.com!takemy.news.telefonica.de!telefonica.de!newsfeed.arcor.de!newsspool2.arcor-online.net!news.arcor.de.POSTED!not-for-mail Date: Tue, 20 Aug 2013 08:43:01 +0200 From: Georg Bauhaus User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:17.0) Gecko/20130801 Thunderbird/17.0.8 MIME-Version: 1.0 Newsgroups: comp.lang.ada Subject: Re: library/binding for sftp? References: <85li4gmhrt.fsf@stephe-leake.org><2wgl8bcmdsu0$.1rs1604fzwufv.dlg@40tude.net><85vc3jfias.fsf@stephe-leake.org><1gwg87tgm2bo7$.ae7440ka6kmc.dlg@40tude.net><85bo59g6h7.fsf@stephe-leake.org><5987935c-dbce-4602-b0e6-2bb85513588b@googlegroups.com><9oo34px7j5ko$.1j7bcnxwzgcxe.dlg@40tude.net><20130808111404.5fc6ce14@hactar.xn--rombobjrn-67a.se><1nfcrgjw8vkrb.1aukq12ys882l$.dlg@40tude.net><20130808133709.09dfef98@hactar.xn--rombobjrn-67a.se> <20130809104904.6ca91de2@hactar.xn--rombobjrn-67a.se> In-Reply-To: Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit Message-ID: <52130ff0$0$6552$9b4e6d93@newsspool4.arcor-online.net> Organization: Arcor NNTP-Posting-Date: 20 Aug 2013 08:42:56 CEST NNTP-Posting-Host: 6a2f5dd7.newsspool4.arcor-online.net X-Trace: DXC=n0nBke8jMh2n`gW2MTm]<34IUK:Lh>_cHTX3j=j On 20.08.13 01:15, Randy Brukardt wrote: > If you truly are using only "unknown protocols", then you're by definition > using a private wired connection, and clearly only a determined attacker > would have access to that. And there is no defense against such attackers; > the most you can do is annoy them enough that hopefully they'll look for an > easier target. This view surely phrases protection using ciphers as protection using physical privacy... and presupposes hackers' determinations, as might have been the case of http://en.wikipedia.org/wiki/DigiNotar . As can be concluded from the case, physical measures have not prevented ensuing bankruptcy! I'll offer 10,-€ (yes, that's little in view of your average incomes, but is worth some beer) for solving this unknown protocol. SYN1Bo3AHS7SYO3FP9FXN1H7CEK1eR __ Professional cryptographers, please refrain from acting quickly.