I was inspecting Skype terms and condition

http://www.skype.com/en/legal/tou/#15
" [...]We will process your personal information, the traffic data and
the content of your communication(s) in accordance with our Privacy
Policy:http://www.skype.com/go/privacy.";

http://www.skype.com/en/legal/privacy/
1. WHAT INFORMATION DOES SKYPE COLLECT AND USE?
.....
Content of instant messaging communications, voicemails, and video messages

Nikos

On Sun, May 19, 2013 at 10:41 PM, Jacob Appelbaum <[email protected]> wrote:
> Krassimir Tzvetanov:
>> To the best of my knowledge in Russia (no, I'm not Russian nor have lived
>> there so I'm not 100% sure) you need to submit a copy of the private key if
>> you are operating a website providing encryption on their territory to
>> allow for legal intercept.
>>
>> They also have other provisions about wiretapping and monitoring which
>> would mean that Skype really has not options if they want to _legally_
>> operate there... It's just the way the local legislation is rather than a
>> function of how Skype is. They are just following the law. Now if somebody
>> does not like the law there are other ways to approach this but
>> breaking/violating it is usually one that is not effective.
>>
>> I think this discussion is focusing too much into the technical details and
>> forgets a simple detail - doing some of those things to increase privacy
>> may itself be _illegal_ in certain jurisdictions which make this even more
>> fun.
>>
>> It's not impossible but it is usually very difficult to provide technical
>> solutions to political/politics problems. That's of course just my
>> experience :)
>>
>> Cheers,
>> Krassimir
>
> Hi,
>
> I'm late to the party on this list but I've been worried about these
> kinds of backdoors in Skype for quite some time. My worry partially
> comes from the common rumors, of which there are many, though it is
> largely the existential proof, the economic, the political and the
> social contextual issues that raise the largest concerns in my mind.
>
> As we've seen with Cisco, we know how some of these so-called lawful
> interception systems are implemented:
>
>   http://www.cisco.com/web/about/security/intelligence/LI-3GPP.html
>
> This patent by Microsoft may be of interest to those looking into Skype,
> automated interception and probably many other kinds of interception -
> note that this is not just a matter of recording, it in fact *tampers*
> with the data:
>
> "Aspects of the subject matter described herein relate to silently
> recording communications. In aspects, data associated with a request to
> establish a communication is modified to cause the communication to be
> established via a path that includes a recording agent. Modification may
> include, for example, adding, changing, and/or deleting data within the
> data. The data as modified is then passed to a protocol entity that uses
> the data to establish a communication session. Because of the way in
> which the data has been modified, the protocol entity selects a path
> that includes the recording agent. The recording agent is then able to
> silently record the communication."
>
>
> http://appft1.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&Sect2=HITOFF&u=%2Fnetahtml%2FPTO%2Fsearch-adv.html&r=1&f=G&l=50&d=PG01&p=1&S1=20110153809&OS=20110153809&RS=20110153809
>
> Note that this is from 2009 and the Skype purchase was not finalized
> until 2011.
>
> Perhaps the authors (Ghanem; George; (Redmond, WA) ; Bizga; Lawrence
> Felix; (Monroe, WA) ; Khanchandani; Niraj K.; (Redmond, WA)) of that
> patent are open to discussing how they might improve on their patent for
> a peer to peer system as deployed today? :)
>
> Skype is clearly inspecting the entire message and right now, we have an
> existential proof that they extract at least HTTP and HTTPS urls and
> process them in some fashion. I suspect that it would be a useful idea
> to insert many different kinds of protocols to see the depth of the
> rabbit hole probing, so to speak.
>
>   http://user@password:www.example.com/secret-area
>   magnet://[hash]
>   ftp://ftp.example.com
>   https://user@password:www.example.com/secret-area
>   telnet//user@password:telnet.example.com
>
> I would also suggest that we might try a few hacks to determine where
> the parsing, inspection and extraction of interesting data is or isn't
> taking place. As an example - run Skype in a virtual machine, type a
> message - delay the message sending to the network, freeze the virtual
> machine and flip a single bit in the url already in the outbound message
> queue. This isn't trivial to do with Skype by any means but it most
> certainly isn't impossible for someone with the inclination.
>
> We know that Skype clients sync up the social graph of a given user;
> they call this a buddy list. This suggests that information in the
> directory of clients and the linked list for relationships is stored on
> their servers - is it encrypted in a way that may not be recovered by
> anyone other than the user? Skype dynamically routes calls to devices,
> does this imply that the location of the user is disclosed to the
> network or stored in some kind of time series data structure? Chat
> message history is in sync across clients, how is this data stored?
> Messages may be queued for a given user - how are these messages
> encrypted, authenticated and retained to ensure integrity during the
> queuing? We also know that Skype is able to call out with the feature
> SkypeOut - so we know that someone has to comply with CALEA - even if it
> isn't Microsoft, the calls/sms hit a VoIP gateway or the SS7 network
> somewhere. Who peers with them? Have any telecom switch operators
> attempted to trace these calls and openly published the metadata that is
> normally not available to end user telephone systems? This is among many
> other "features" that deserve a discussion and by no means an exhaustive
> list.
>
> We see that there is a great deal of pressure around the world to allow
> for interception:
>
>
> http://www.rudebaguette.com/2013/03/12/skype-may-face-criminal-charges-if-it-doesnt-let-french-police-listen-in-on-skype-calls/
>
> We also see that there are variants of Skype that *do* inspect text that
> is on censorship lists:
>
>
> http://www.businessweek.com/articles/2013-03-08/skypes-been-hijacked-in-china-and-microsoft-is-o-dot-k-dot-with-it
>
>   http://cs.unm.edu/~jeffk/tom-skype/
>
> The above of course says nothing of the Tom Skype fiasco that included
> untold numbers of unecrypted chat messages being logged on open
> web-servers as exposed by Citizen Lab as well as others.
>
> We see that location privacy is clearly not a priority and if it is,
> they've failed at the goal:
>
>
> http://community.skype.com/t5/Security-Privacy-Trust-and/Easy-way-to-lookup-IP-address-of-a-skype-username/td-p/689903
>
>
> http://bits.blogs.nytimes.com/2011/11/29/skype-can-expose-your-location-researchers-say/
>
> To distinguish how this failure happens, I propose a simple experiment.
> It should be possible to give a Skype client a public IP and then
> transparently route all traffic it over Tor - if the Skype client
> reports on its IP to the network, it will give the public IP bound to
> the interface, if it does it through some network activity or if the
> network service discovers the IP, the Tor exit node IP will be
> disclosed. I suspect there are a few other variants and different
> internal Skype systems likely have access to different IP addressing
> information.
>
> Chat syncing supposedly happens between clients that are online, though
> one wonders how this connection is internally authenticated, as well as
> if anyone may simply remotely pull the chat logs from a given client:
>
>
> http://community.skype.com/t5/Windows-desktop-client/Chat-History-on-Multiple-Computers-Retaining-one-deleting-other/td-p/159190
>
>
> http://community.skype.com/t5/Security-Privacy-Trust-and/Is-chat-history-stored-on-Skype-servers/td-p/472379
>
> Note that Skype claims that they do store this for ~30 days:
>
>   http://www.skype.com/en/legal/privacy/#12
>
> Really though, I don't know how clear cut their backdoor needs to be
> disclaimed than the following text from the above link:
>
> "Skype will retain your information for as long as is necessary to: (1)
> fulfill any of the Purposes (as defined in article 2 of this Privacy
> Policy) or (2) comply with applicable legislation, regulatory requests
> and relevant orders from competent courts.
>
> "Retention of Instant Messages, Voicemail Messages, and Video Messages
> (Skype internet communications software application only)
>
> "Your instant messaging (IM), voicemail, and video message content
> (collectively “messages”) may be stored by Skype (a) to convey and
> synchronize your messages and (b) to enable you to retrieve the messages
> and history where possible. Depending on the message type, messages are
> generally stored by Skype for a maximum of between 30 and 90 days unless
> otherwise permitted or required by law. This storage facilitates
> delivery of messages when a user is offline and to help sync messages
> between user devices.  For IM, if you have linked your Skype and
> Microsoft accounts, you may have the option to choose to store your full
> IM history for a longer period. In that case, your IMs may be stored in
> your Outlook.com Messaging folder until you manually delete them. For
> Video messages, you may also choose to store messages for an extended
> period if the sender is a Premium Member.
>
> "Skype will take appropriate technical and security measures to protect
> your information. By using this product, you consent to the storage of
> your IM, voicemail, and video message communications as described above.
>
> Yowza!
>
> There are specific properties that many desire from a communication
> system. It seems that we have seen reports of some of these things
> working in a way that suggests most of it is done in the simplest manner
> possible: without strong cryptography, if any cryptography, and without
> strong technical privacy of any sort. Often technically illiterate
> journalists, especially Microsoft apologists, will suggest that Skype is
> encrypted - this is of course hand waving bordering on masturbation - of
> course there is encryption of sorts. The questions are about what data
> is stored, who has access to that data and how that data is protected -
> these issues are absolutely not disclosed in any meaningful sense - not
> the least of which is with the source code of an end user client that we
> are welcome to analyze openly.
>
> I might add that some tactical hacking shops have a collection of 0day
> for Skype that is used to break into "suspects" computers for insertion
> of malware. My guess is that this is so common that it is commercially
> supported by backdoors. This likely includes Remote Control System's
> Hacking Team tools, a.k.a. DaVinci and FinFisher, which we know uses
> Skype's API directly:
>
>   https://twitter.com/botherder/status/334775398904758273
>
> I should also add that I had the chance to meet one of the founders of
> Skype last week. I encourage people to reach out to the founders and to
> directly and politely, ask about interception capabilities, legal
> requirements as well as architectural designs; most of this is
> pre-Microsoft, of course. Still we'll begin to understand the historical
> context for the current behaviors, we may even find historical behaviors
> that match present behaviors.
>
> I would also suggest looking at the court dockets and cases filed in
> Luxembourg. I suspect that the number of lawful orders is not zero and
> that the number of times data has been returned is also not zero.
>
> So to summarize, we have strong evidence or admission from Skype and/or
> Microsoft for the following:
>
>   Skype logs chat, buddy list, audio, video, email address and more.
>   Data is stored/disclosed to third parties in various circumstances.
>   Data is unencrypted and data-mined by machines.
>   Data is used by Skype/Microsoft for various reasons.
>   Skype API is used by malware used by thug pigs in dictatorships.
>   Skype API is used by malware used by Honest Cops in the Free World.
>   Skype's binary is obfuscated to prevent analysis by reverse engineers.
>   SkypeOut touches networks that must be CALEA compliant.
>
> I wouldn't use this for activism anywhere in the world. I can't imagine
> that it would be reasonable for victims of domestic violence, amongst
> other likely users, to use it either.
>
> Perhaps Microsoft will fix all of these things? And if they're not
> interested in fixing it, perhaps they might comment on it and line by
> line confirm, deny or explain these issues?
>
> The Microsoft Law Enforcement Requests Report seems to suggest that
> they're open to hearing from the wider community:
>
>
> http://www.microsoft.com/about/corporatecitizenship/en-us/reporting/transparency
>
> I've cc'ed the email mention on their transparency report - I did this
> previously and never received a substantial reply; perhaps this time?
>
> All the best,
> Jacob
> _______________________________________________
> cryptography mailing list
> [email protected]
> http://lists.randombit.net/mailman/listinfo/cryptography
_______________________________________________
cryptography mailing list
[email protected]
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to