Q: Does telepathy-kde4 replace and deprecated Decibel? It seems like decibel is completely gone now….
A: Yes, decibel is dead and gone. Forget about it.
Q: Will Telepathy-KDE result in yet another resource-hogging, hard-or-impossible-to-get-rid-of daemon like Akonadi?
A: You can just use any other IM application if you don't like it, but you won't get any of the cool features that come with Telepathy.
Q: Will each application that uses Telepathy-KDE keep it’s own contact list, or will all apps use a central contact list (e.g. one in KAdressbook or Kopete)?
A: You will have just one "contact list model" but you can have as many "views" on that contact list as you want. So each applications will share the contacts, but may have a different way to display them.
Q: Some questions have sort of touched on this, but will telepathy contacts integrate with PIM contacts like akonadi or evolution?
Q: Will it support video conferences (with jingle - to be compatible with google talk) and voice with SIP?
A: Yes, it already does.
Q: Will this technology also be used for supporting collaborative editing in KDE apps (e.g. KOffice)?
A: One of our goals is to offer to developers an easy to use framework that will allow this. Anyway developers of the single applications may choose to use it or not.
Q: Will there be a way to store your contacts to a flash drive for easy transfer between computers, or even using a contact list stored on a flash drive directly?
A: All metadata related to the contacts are stored on nepomuk. There was a GSOC project that will allow to backup and restore nepomuk database, so it will probably be possible as soon as this is possible. It won't be possible to store your contact list on a flash drive unless you configure nepomuk to store all your metadata there
Q: Is there a possibility of putting the chat interface directly in plasma instead of using a separate window, or an easy way for developers to embed a chat interface in their program for collaborative work?
A: We are planning to have a "chat widget" (or maybe a chat kpart) that you can embed in your program. Probably it will be possible to have a plasma widget that uses that widget.
Q: When are we to expect this stable enough for testing?
A: We are planning to release a "preview release" codenamed "ThereWillBeBugs" in January 2011 (or sooner).
Q: When can we expect API stability?
A: We are planning to release a "stable release" at the same time of KDE 4.7 (July 2011).
Q: How will the contact-list be organized? Maybe through KAdressbook?
A: Contacts are stored in Nepomuk and are available to every application.
Q: Can I detect whether my contacts are are online from my app?
A: Of course you can!
Q: Send files in background to synchronize some metadata (ie: some small files, but the user doesn’t accept those explicitly)
A: When you send a file you can set mimetype and you can set a filter to your application so that the channel dispatcher will give to your application all file transfers with that specific mimetype. But some connection manager don't manage mimetype correctly.
Q: Is it possible to identify user just with IP+ssh key for instance, instead of requiring them to have an IM account
Q: Is it feasible to transfer huge files; can I resume a broken transfer?
Q: Can I do streaming, ie: audio or video streaming?
Q: Do you have python bindings for all of this?
Q: and bonus question: how much of it is kde-specific and how much can be done with Qt only?
Q: Telepathy seems to be a freedesktop.org specification. Does this mean that KDE and Gnome apps (with similar use cases) which both use Telepathy tubes will be able to interact smoothly? (Not only in theory, but also in practice?)
A: In theory yes, in practice also yes, as soon as they share the same protocol (for streamtubes) or the same dbus interface (for dbustubes).
Q: Does it work behind a firewall/router?
A: It does as soon as the port used for the connection to the im server is open.
Q: Are incoming connections restricted to trusted user? If not, what protective measures are implemented against spam, malicious impersonation, and similar attacks?
Q: secure connections