On May 26, 2012, at 8:15 34AM, Eugen Leitl wrote: > On Fri, May 25, 2012 at 11:19:33AM -0700, Jon Callas wrote: > >> My money would be on a combination of traffic analysis and targeted >> malware. We know that the Germans have been pioneering using targeted malware >> against Skype. Once you've done that, you can pick apart anything else. Just >> a simple matter of coding. > > Unrelated, IIRC Microsoft changed the architecture of supernodes to allow > for lawful interception with Skype. It would be interesting to see inasmuch > an open source version of Skype would want to evade that infrastructure, > while asserting interoperability with legacy users.
I've seen news stories about Microsoft deploying its own supernodes, rather than relying "on the kindness of strangers". I haven't seen any stories about making lawful intercept possible -- do you have a source? --Steve Bellovin, https://www.cs.columbia.edu/~smb _______________________________________________ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography