Re: Source for Skype Trojan released

2009-09-08 Thread Dave Howe
Stephan Neuhaus wrote:
 
 On Aug 31, 2009, at 13:20, Jerry Leichter wrote:
 
 It can “...intercept all audio data coming and going to the Skype
 process.”
 
 Interesting, but is this a novel idea? As far as I can see, the process
 intercepts the audio before it reaches Skype and after it has left
 Skype. Isn't that the same as calling a keylogger a PGP Trojan?

Not really. more generically, you could call it a VoIP trojan or even
Audio monitoring trojan - presumably a more advanced version could
listen to the mic stream even when the VoIP application is not in use,
in order to obtain information.

However, in context, this was designed to be used for law enforcement to
bug a skype VoIP session, so the name reflects the design goal; yes,
it is a more generalized attack than that, but not in intent or
(presumed) usage.

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to majord...@metzdowd.com


Re: Source for Skype Trojan released

2009-09-04 Thread Stephan Neuhaus


On Aug 31, 2009, at 13:20, Jerry Leichter wrote:

It can “...intercept all audio data coming and going to the Skype  
process.”


Interesting, but is this a novel idea? As far as I can see, the  
process intercepts the audio before it reaches Skype and after it has  
left Skype. Isn't that the same as calling a keylogger a PGP Trojan?


Stephan
-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to majord...@metzdowd.com