On May 26, 2012, at 8:15 34AM, Eugen Leitl wrote:
> On Fri, May 25, 2012 at 11:19:33AM -0700, Jon Callas wrote:
>
>> My money would be on a combination of traffic analysis and targeted
>> malware. We know that the Germans have been pioneering using targeted malware
>> against Skype. Once you've done that, you can pick apart anything else. Just
>> a simple matter of coding.
>
> Unrelated, IIRC Microsoft changed the architecture of supernodes to allow
> for lawful interception with Skype. It would be interesting to see inasmuch
> an open source version of Skype would want to evade that infrastructure,
> while asserting interoperability with legacy users.
I've seen news stories about Microsoft deploying its own supernodes, rather
than relying "on the kindness of strangers". I haven't seen any stories
about making lawful intercept possible -- do you have a source?
--Steve Bellovin, https://www.cs.columbia.edu/~smb
_______________________________________________
cryptography mailing list
[email protected]
http://lists.randombit.net/mailman/listinfo/cryptography