Bug 321673 - Options to mitigate information leakage from default CTCP responses
Summary: Options to mitigate information leakage from default CTCP responses
Status: CONFIRMED
Alias: None
Product: konversation
Classification: Applications
Component: protocol (show other bugs)
Version: 1.5-rc1
Platform: Ubuntu Linux
: NOR wishlist
Target Milestone: ---
Assignee: Konversation Developers
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2013-06-27 12:52 UTC by gits1225
Modified: 2014-10-03 01:23 UTC (History)
2 users (show)

See Also:
Latest Commit:
Version Fixed In:


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description gits1225 2013-06-27 12:52:32 UTC
CTCP response can be used to personally identify someone across networks. Having options to configure the various CTCP reponses such as VERSION, TIME, PING, etc would protect privacy of users.

Reproducible: Always
Comment 1 gits1225 2013-06-27 13:36:11 UTC
You are able to customize CTCP response for VERSION but not for TIME and PING, I forgot to mention that in my earlier comment.
Comment 2 argonel 2013-06-27 19:15:46 UTC
CTCP TIME, OK, that's a potential information leak. CTCP PING, the
information is from the sender, not your client.
 On Jun 27, 2013 9:36 AM, "Aby James" <gits1225@gmail.com> wrote:

> https://bugs.kde.org/show_bug.cgi?id=321673
>
> --- Comment #1 from Aby James <gits1225@gmail.com> ---
> You are able to customize CTCP response for VERSION but not for TIME and
> PING,
> I forgot to mention that in my earlier comment.
>
> --
> You are receiving this mail because:
> You are the assignee for the bug.
> _______________________________________________
> Konversation-devel mailing list
> Konversation-devel@kde.org
> https://mail.kde.org/mailman/listinfo/konversation-devel
>
Comment 3 Glorfindel 2014-10-03 01:23:18 UTC
Could this be implemented please?