Blog Archive
- 2013 (264)
-
2012
(311)
- December(7)
- November(24)
- October(56)
- September(16)
-
August(49)
- The TSA's Infamous 'Behavior Detection' In Action:...
- Amplifiers and Linear INA230 Precision Digital/Cur...
- Movement-monitoring garment gives feedback for yog...
- D-Link DIR-605L Cloud Router Review: Strong Monito...
- See What People Are Saying About Your Business Wit...
- Motorola MOTOACTV now likes Ice Cream Sandwich, to...
- Acer's B243PWL is a 24-inch IPS Display for Commer...
- Soca shuts 36 credit card fraud sites
- West Cheshire College Tracks Whereabouts of Studen...
- Dynamic infographic shows how the London mayoral e...
- UK High Court rules ISPs to block Pirate Bay, forg...
- YouTube loses copyright battle
- How to download your data from Google and Facebook
- Me and my data: how much do the internet giants re...
- Tim Berners-Lee Says UK's Net Spying Plans Would B...
- SmartShell uses hydraulics, not bulk, for structur...
- McDermott Sees Gains From RFID Tracking in Indonesia
- YouTube loses music clip copyright battle in court
- Updated Sysinternals Suite Available: NotMyFault, ...
- HWiNFO 3.95 Released
- Geek deals: 24-inch 1080p Planar monitor for $139.99
- Amplifiers and Linear INA282-Q1 Automotive Catalog...
- Lenovo ThinkVision LT1421 Portable Monitor Review:...
- Straighten up and fly right - Philips' ErgoSensor ...
- Geek deals: $498 off quad-core Dell desktop and 24...
- Improve Search Engine Rank With Advanced Web Ranking
- Project Glass Could Be Called Google Eye When It L...
- Nest 2.0 Adds Advanced Energy-Saving Features
- Crooks Use Rogue Applications to Take Over Twitter...
- FLA Report Reveals Issues At Foxconn Plants, Detai...
- Specialized Turbo e-bike is too fast and furious f...
- Intel's Thin Mini-ITX platform gets stuffed inside...
- ISPs To Start Policing The Net More Actively At Go...
- Expand Your Taskbar to a Second Monitor With Free ...
- Indian Filmmaker Anurag Kashyap: 'Piracy Helps Del...
- MultiMon Taskbar Free Adds a Taskbar to a Second M...
- How Twitter transformed dance
- Clearing The Air On Skype: Most Of What You Read W...
- Technology is giving abusers the edge
- Square Kilometer Array Organisation opts for dual ...
- Highlight Hunter makes hunting down video highligh...
- Nvidia Jumps On The Miracast Wireless Display Stan...
- Finnish Transport Agency to Track Railcar Health V...
- Swarming quadrocopters complete trial recon missio...
- Bus monitor's abusers suspended from school
- How technology lowers transaction costs for everyone
- The insidious power of brand content
- Disorganised but effective: how technology lowers ...
- The Battle For Net Neutrality Flares Up Again: But...
- July(19)
- June(13)
- May(21)
- April(19)
- March(47)
- February(29)
- January(11)
- 2011 (481)
- 2010 (37)
Blog Archive
-
▼
2012
(311)
-
▼
August
(49)
- The TSA's Infamous 'Behavior Detection' In Action:...
- Amplifiers and Linear INA230 Precision Digital/Cur...
- Movement-monitoring garment gives feedback for yog...
- D-Link DIR-605L Cloud Router Review: Strong Monito...
- See What People Are Saying About Your Business Wit...
- Motorola MOTOACTV now likes Ice Cream Sandwich, to...
- Acer's B243PWL is a 24-inch IPS Display for Commer...
- Soca shuts 36 credit card fraud sites
- West Cheshire College Tracks Whereabouts of Studen...
- Dynamic infographic shows how the London mayoral e...
- UK High Court rules ISPs to block Pirate Bay, forg...
- YouTube loses copyright battle
- How to download your data from Google and Facebook
- Me and my data: how much do the internet giants re...
- Tim Berners-Lee Says UK's Net Spying Plans Would B...
- SmartShell uses hydraulics, not bulk, for structur...
- McDermott Sees Gains From RFID Tracking in Indonesia
- YouTube loses music clip copyright battle in court
- Updated Sysinternals Suite Available: NotMyFault, ...
- HWiNFO 3.95 Released
- Geek deals: 24-inch 1080p Planar monitor for $139.99
- Amplifiers and Linear INA282-Q1 Automotive Catalog...
- Lenovo ThinkVision LT1421 Portable Monitor Review:...
- Straighten up and fly right - Philips' ErgoSensor ...
- Geek deals: $498 off quad-core Dell desktop and 24...
- Improve Search Engine Rank With Advanced Web Ranking
- Project Glass Could Be Called Google Eye When It L...
- Nest 2.0 Adds Advanced Energy-Saving Features
- Crooks Use Rogue Applications to Take Over Twitter...
- FLA Report Reveals Issues At Foxconn Plants, Detai...
- Specialized Turbo e-bike is too fast and furious f...
- Intel's Thin Mini-ITX platform gets stuffed inside...
- ISPs To Start Policing The Net More Actively At Go...
- Expand Your Taskbar to a Second Monitor With Free ...
- Indian Filmmaker Anurag Kashyap: 'Piracy Helps Del...
- MultiMon Taskbar Free Adds a Taskbar to a Second M...
- How Twitter transformed dance
- Clearing The Air On Skype: Most Of What You Read W...
- Technology is giving abusers the edge
- Square Kilometer Array Organisation opts for dual ...
- Highlight Hunter makes hunting down video highligh...
- Nvidia Jumps On The Miracast Wireless Display Stan...
- Finnish Transport Agency to Track Railcar Health V...
- Swarming quadrocopters complete trial recon missio...
- Bus monitor's abusers suspended from school
- How technology lowers transaction costs for everyone
- The insidious power of brand content
- Disorganised but effective: how technology lowers ...
- The Battle For Net Neutrality Flares Up Again: But...
-
▼
August
(49)
Monday, August 6, 2012
Clearing The Air On Skype: Most Of What You Read Was Not Accurate, But There Are Still Reasons To Worry
The "Skype can allow police to listen to the calls of their" furor took off within days. The Washington Post reported that Skype has been making it easier law enforcement to get the chat text and user data. It's not really clear that this is true if (but more on that later). Then kick into high gear when Eric Jackson at Forbes ( which we wrote about before taking strangely uninformed about the fight patent Yahoo / Facebook and those who reported on him) wrote a post saying that Microsoft ridiculously ignorant can listen to all your Skype calls, based on a misunderstanding of incredible denial of the original publication of Skype to comment directly on the skills of the wiretap.
moreJackson sensible fellow, Kash Hill, back in the claims of Jackson, but also noted that the law (United States) is quite clear that there Microsoft has no legal obligation to use Skype ... but there have been regular efforts made to change this situation. Hill spoke the lawyer Jennifer Granick, who noted that only the uncertainty and the threat that this legislation could go down the road once seemed to lead to development decisions left open the possibility of monitoring:
But what is really happening, and that much of what appears to be conjecture and speculation? Well, as the attention and the issues, weighed Skype to "clarify". He said he was the installation of more in-house "supernodes" (in the more distant past, many Skype users who act as supernodes) to improve the quality of the repertoire - but Skype to Skype calls ( once again, calls not touch the public telephone network) were still encrypted from one person to the call of the person:
The mere threat of regulation is driving innovation in the direction of the rear doors and compliance monitoring. And the law of the United States does not, however.
The movement in the home of "supernodes" do not establish a control or call log. "Supernodes" Skype help customers to locate each other so that Skype calls can be made. In short, the great act as a distributed directory of Skype users. Skype to Skype calls do not pass through our data centers and "supernodes" are not involved, by the way, the. Media (audio or video) between users of Skype
These calls are established directly between the participating nodes in Skype (customers). In some cases, Skype has added servers to help set up calls, operation or maintenance, for example, a server is used to notify a customer that a new call and begins the Skype application n is not complete is running (for example, the device is suspended, sleep or requires notification of the incoming call), or in a group video call, where a server aggregates the media stream (video) multiple clients and roads from east to customers who otherwise might not have enough bandwidth to make connections to all participants.
- [....] The Skype software is applied regardless of encryption of Skype to Skype calls between computers, smart phones and other mobile devices with the possibility A complete version of Skype software has always done. This has not changed.
- But ... there are still reasons to be a little (not hysterical) question? Perhaps. Chris Soghoian has the best job by far, in what is known and what is unknown, which explains how one person to another Skype encryption can not be so totally untappable as some suppose. He emphasizes that while Skype to Skype is encrypted, Skype has access to the encryption key (which has a full explanation of how / why), and then explains what this probably means:
- Ok, so Skype has access to encryption keys and user communications (or you can allow other users to upgrade to Skype). What does this mean for the confidentiality of Skype calls? Skype may actually be telling the truth when he told reporters that do not provide CALEA-style wiretapping capabilities to governments. You may not need. If governments can intercept and record users of encrypted communications (with the assistance provided by Internet service providers), and the encryption keys used by both ends of the conversation or you can go with Skype and to human attacks in the middle of their conversation, then you can decrypt the voice communication without any additional help from Skype.
So there is a risk there, and Soghoian notes that the reluctance of Skype to get things exactly the way it handles the encoding leaves open the possibility. It is very possible that he is not
are
Find best price for : --Kash----Microsoft----Skype--
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment