I will wait to hear his uncontrollable laughter........ ;)
While I appreciate the work you have done with ES5 and fully appreciate any and all efforts to thwart the somewhat idiotic attempts by the MPAA and RIAA to have government enforce their own profit gathering I also have a responsibility to my company to enforce it’s policies within our own network. One of those policies is that copyrighted material may not be downloaded and utilized in breach of any law. We are a non-profit organization, (read: we have no money….<s>), and downloading files such as those ES5 would provide causes clogging of our already limited bandwidth and potentially opens my company up to liability should we be discovered. I appreciate that they way you have written ES5 is quite close to “bullet-proof” but my company can still be sued on verbal evidence, (User X goes running around telling the wrong people how he uses ES5 at work and it can’t be stopped or detected).
My question: Is there a consistent signature(s) in the initial packets, or subsequent packets that I, as a systems administrator, can capture with an IDS to alert me to your product’s use?
As I said above, I personally commend you for your work and would recommend your product to any of my users that wish to use a P2P network from their home but I do have a responsibility to my company and I would be negligent should I not try to properly enforce the policies I myself wrote.
Any assistance in this would be greatly appreciated,