by Mike Masnick
Mon, Aug 31st 2009 1:25am
One of the benefits of Skype was that, due to the way it works (P2P, encrypted communications), it made it much more difficult to do any sort of wiretap. This has upset various governments who are used to having the ability to wiretap any voice communications. However, it's never impossible. The most obvious way is to simply create some sort of trojan that gets installed on one user's computer that has audio recording abilities -- and Symantec is going around hyping up the fact that source code for just such a trojan has been released. Of course, even Symantec admits that there's no evidence of the code actually being used in the wild -- it seems more like a proof-of-concept. On top of that, it's hardly a new idea. Nearly a year ago, we talked about how German authorities were accused of using something that sounded quite similar. Still, it is a good reminder that even if you're using an encrypted Skype call, at either end of that call, the audio is decrypted, and a well-placed recording system can capture it.
If you liked this post, you may also be interested in...
- FBI Sends Computer Information Collected By Its Hacking Tools In Unencrypted Form Over The Open Internet
- FBI Internal Report Says FBI's 2007 Impersonation Of An AP Journalist Not Exactly By The Book
- Judge Says The FBI Can Keep Its Hacking Tool Secret, But Not The Evidence Obtained With It
- Moroccan Telcos Block Free VoIP Calls To Protect Their Bottom Lines
- Net Neutrality Under Threat In India