by Mike Masnick
Mon, Aug 31st 2009 1:25am
One of the benefits of Skype was that, due to the way it works (P2P, encrypted communications), it made it much more difficult to do any sort of wiretap. This has upset various governments who are used to having the ability to wiretap any voice communications. However, it's never impossible. The most obvious way is to simply create some sort of trojan that gets installed on one user's computer that has audio recording abilities -- and Symantec is going around hyping up the fact that source code for just such a trojan has been released. Of course, even Symantec admits that there's no evidence of the code actually being used in the wild -- it seems more like a proof-of-concept. On top of that, it's hardly a new idea. Nearly a year ago, we talked about how German authorities were accused of using something that sounded quite similar. Still, it is a good reminder that even if you're using an encrypted Skype call, at either end of that call, the audio is decrypted, and a well-placed recording system can capture it.
If you liked this post, you may also be interested in...
- ACLU Seeks To Unseal Docket In FBI's Tor-Exploiting Takedown Of Freedom Hosting
- Why Are The Congressional Intelligence Committees So Quiet On The NSA Malware Leaks?
- Australian Law Enforcement Hacked US Users' Computers During Child Porn Investigation
- Moroccan Telcos Block Free VoIP Calls To Protect Their Bottom Lines
- Net Neutrality Under Threat In India