by Mike Masnick
Mon, Aug 31st 2009 1:25am
One of the benefits of Skype was that, due to the way it works (P2P, encrypted communications), it made it much more difficult to do any sort of wiretap. This has upset various governments who are used to having the ability to wiretap any voice communications. However, it's never impossible. The most obvious way is to simply create some sort of trojan that gets installed on one user's computer that has audio recording abilities -- and Symantec is going around hyping up the fact that source code for just such a trojan has been released. Of course, even Symantec admits that there's no evidence of the code actually being used in the wild -- it seems more like a proof-of-concept. On top of that, it's hardly a new idea. Nearly a year ago, we talked about how German authorities were accused of using something that sounded quite similar. Still, it is a good reminder that even if you're using an encrypted Skype call, at either end of that call, the audio is decrypted, and a well-placed recording system can capture it.
If you liked this post, you may also be interested in...
- Judge: FBI's NIT Warrant Invalid And IP Addresses Do Have An Expectation Of Privacy, But No Suppression Granted
- Ransomware Attack Left DC Police Surveillance Blind Shortly Before The Innauguration
- Malware Purveyor Serving Up Ransomware Via Bogus ICANN Blacklist Removal Emails
- Belgian Court Fines Microsoft For Failing To Comply With Its Impossible Order
- Moroccan Telcos Block Free VoIP Calls To Protect Their Bottom Lines