Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Lol. Good one. These protocols are completely independent of the content that you can send over them.

For the most part they reuse TLS so the encryption is the same (and uses the same certificate authorities) so any man-in-the-middle proxies, like those used by corporations, are technically able to intercept them to monitor content just like they can for https. (Though personally those sorts of things make me feel ill )

Good luck banning these protocols as well. They're perfectly valid IP packets so identifying them is going to be hard.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: