On May 26, 2012, at 8:15 34AM, Eugen Leitl wrote:

> On Fri, May 25, 2012 at 11:19:33AM -0700, Jon Callas wrote:
> 
>> My money would be on a combination of traffic analysis and targeted
>> malware. We know that the Germans have been pioneering using targeted malware
>> against Skype. Once you've done that, you can pick apart anything else. Just
>> a simple matter of coding.
> 
> Unrelated, IIRC Microsoft changed the architecture of supernodes to allow
> for lawful interception with Skype. It would be interesting to see inasmuch
> an open source version of Skype would want to evade that infrastructure,
> while asserting interoperability with legacy users.

I've seen news stories about Microsoft deploying its own supernodes, rather
than relying "on the kindness of strangers".  I haven't seen any stories
about making lawful intercept possible -- do you have a source?


                --Steve Bellovin, https://www.cs.columbia.edu/~smb





_______________________________________________
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to