On Aug 31, 2009, at 13:20, Jerry Leichter wrote:

It can “...intercept all audio data coming and going to the Skype process.”

Interesting, but is this a novel idea? As far as I can see, the process intercepts the audio before it reaches Skype and after it has left Skype. Isn't that the same as calling a keylogger a "PGP Trojan"?

The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majord...@metzdowd.com

Reply via email to