Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Communications Security

More Skype Back Door Speculation 210

An anonymous reader writes "According to reports, there may be a back door built into Skype, which allows connections to be bugged. The company has declined to expressly deny the allegations. At a meeting with representatives of ISPs and the Austrian regulator on lawful interception of IP based services held on 25th June, high-ranking officials at the Austrian interior ministry revealed that it is not a problem for them to listen in on Skype conversations."
This discussion has been archived. No new comments can be posted.

More Skype Back Door Speculation

Comments Filter:
  • by Bromskloss ( 750445 ) <auxiliary,address,for,privacy&gmail,com> on Saturday July 26, 2008 @11:20AM (#24348315)
    Unless you think it's a good thing that some people can snoop on others conversations, this should be a really good reason to embrace free software.
  • by erroneus ( 253617 ) on Saturday July 26, 2008 @11:23AM (#24348361) Homepage

    I know it's tedious work, but some people actually seem to like it. Isn't it time that people disassemble these suspected binaries in order to issue a report on the matter? Not only on Skype, but on many other suspected programs, libraries and operating systems?

  • by Anonymous Coward on Saturday July 26, 2008 @11:42AM (#24348485)

    All you have to know to monitor someone's Skype is their password. Login with Skype on another machine, set status to invisible. Anything they type or receive in chat you receive.

    1. For IM: Jabber (non-US server) + OTR Plugin + Tor.
    2. For everything else (email/vpn/storage) services as provided by www.xerobank.com will do you good.
    3. TrueCrypt Full Drive Encryption. (Check your local laws - under Dutch law they cannot force me to give up the passwords ... and we don't do waterboarding here) (I hope)

  • by speedtux ( 1307149 ) on Saturday July 26, 2008 @11:49AM (#24348547)

    You can be sure that these people are also trying to:

    • get backdoors into Ethernet firmware and BIOSes
    • get backdoors into routers and other infrastructure
    • get backdoors into commercial software
    • get backdoors into open source packages

    You can be equally certain that they are not doing it right and that the backdoors they are trying to put in make your system less secure.

    Running open source software is your best bet, but even there, you aren't completely protected.

  • by TomatoMan ( 93630 ) on Saturday July 26, 2008 @11:53AM (#24348575) Homepage Journal

    Assume all communication that uses any kind of monitorable infrastructure is bugged. The capacity is there, and the desire is there.

    It is the way of things.

  • by Anonymous Coward on Saturday July 26, 2008 @11:56AM (#24348593)

    If you think of alternatives, you'd expect them to fulfill the same specifications. One of the specifications when switching off the Skype is being able to actually contact other people. Try talking the Average Joe about ie. Ekiga, open source VOIP client. What will happen? You will get that sheepish look and question: "Why would I install that, I already got Skype. BESIDES EVERYONE I KNOW USE SKYPE AND I COULDN'T CALL THEM ANYMORE".

    Such are network effects. There is no alternative for Skype for the specific reason. The alternative should be 100% Skype protocol compatible. (Good luck with that, with the patented codecs alone.)

  • by dyfet ( 154716 ) on Saturday July 26, 2008 @11:57AM (#24348607) Homepage

    This is going to be a problem with any so called "secure" communication system that relies on source secret clients and unpublished protocols.

    There are many ways to build such clients to "assist" external intercept, since they often have to first communicate with some central server to locate users. They could for example have a command that forces the client to always route back through the server (like they do for NAT), and use a simple data transformation rather than full encryption so casual packing snooping makes it "appear" encrypted when it is actually not.

    They might also have flaws in their implimentation, particularly with key exchange, that allows an invisible man in the middle. The ZRTP stuff developed by Phil Zimmerman that we use in GNU Telephony secure calling uses extra steps to compute a sas to validate there are not fake public session keys given out by a man in the middle, for one example of how such flaws can effect otherwise "secure in appearence" systems.

    Of course, even secure peer-reviewed protocols and foss clients do not gaurantee security. For example, one can tether a bunch of ZRTP softphones to an Asterisk server using PBX enrollment, but this enables and requires said server to decrypt all traffic as it passes through, as it acts as a "trusted" man-in-the-middle.

    In the end, the best solution, even with ZRTP, remains using pure peer-to-peer (end-to-end) media connections, and when needed transparent proxy media exchange; the latter for dealing with NAT. In ZRTP, sas negotiation assures any such proxy used for NAT "remains" transparent.

    In the case of Skype, source secret clients that can report false call information and source secret protocols are a clear recipe for disaster.

  • by Opportunist ( 166417 ) on Saturday July 26, 2008 @11:58AM (#24348611)

    You know that as soon as some really unbreakable OSS project takes the place of skype, someone will jump up and claim that OSS is promoting terrorism since it keeps the feds from snooping at you?

    What's scary is that a lot of people will nod their head and agree...

  • by erroneus ( 253617 ) on Saturday July 26, 2008 @12:00PM (#24348625) Homepage

    I don't think competitive code is as much of a threat as simply knowing what the code does is a threat.

    I have read through a good portion of the PDF and I agree that the analysis of the breakdown and all of the measures Skype makes to conceal what it's doing are both impressive and worrisome. I suppose, perhaps, an alternative measure might be for some sort of "computing trustworthiness" scale to be created where the worst offenders (like Skype) are ranked as "potentially dangerous" until they [Skype] clears the matter up.

    I suppose in the presence of such a [subjective?] scale, there would be a huge list of programs and applications deemed to be offensive in this way, but perhaps a black list such as this could be useful in attempting to get software a bit more open than it is today? After all, if you could cite an application as "2 out of 10" on the trustworthiness scale as a reason not to purchase, people might begin to take notice. I think a scale like this, whether subjective or not, would enable the technically uninterested to read these 'executive summaries' of information and make better decisions -- making it easier for the public to make more informed choices.

    Would lawsuits result? Of course. But the lawsuits against RBLs once happened frequently before people decided it was better to just take measures to stay off the lists. Consumer Reports once found itself at the receiving end of legal actions and demands (and probably still does) but in the end, it's worth the effort they make as they are generally accepted as a trustworthy source. We need a Consumer Reports for software that exposes the privacy and security concerns that different software poses.

    I know this stuff about Skype has given me reason to pause, but that's just me... I can sort of read and understand most of what I read here. But how about the rest of the uninformed? How can we get the point across to them?

  • by TheRaven64 ( 641858 ) on Saturday July 26, 2008 @12:06PM (#24348677) Journal
    Very few people on the Internet use it. Most SIP usage is either on private networks (e.g. intra-company) or bridged to POTS at the far end.
  • by Chryana ( 708485 ) on Saturday July 26, 2008 @12:10PM (#24348703)

    I'm not saying snooping on my calls is a good thing. However, I don't think free software is the answer here. I make calls from my computer to a land line, how can I prevent my provider, Skype or not, from eavesdropping on my conversations? You don't expect me to convince all my contacts to start using their computer to receive calls, do you?

  • by FriendlyLurker ( 50431 ) on Saturday July 26, 2008 @12:26PM (#24348817)

    Two words: Network Effect [wikipedia.org]. All the alternatives I have reviewed are harder than skype. Harder to download, setup, use, the list goes on.
    Result: Skype is popular - they nailed delivery to the "masses". No screwing around with the microphone, NAT/firewalls, SIP providers, names etc etc. The average joe can just download and install it in just two url clicks, type in a name and begin to use it. Done deal.
    All the open source VOIP (most of them SIP) I have seen completely miss this most important point, and so all their development effort is ultimately wasted - walled themselves off to the technically proficient crowd and not benefiting from the network effect.

  • by daveime ( 1253762 ) on Saturday July 26, 2008 @12:57PM (#24349023)

    Why must EVERY conversation on privacy boil down to a few tired questions about "open source" alternatives ?

    What, like if the source code is open, then that will prevent backdoors ? Erm hello, the client software isn't the problem, it's the network of Skype servers the bloody data passes through that is the weak point in the equation.

    So who do you trust more with your privacy ? A multi million dollar company, or some nerd in his moms basement, acting as a VOIP connectivity server. In my case, I'd chose option "none of the above", but really ... open source is not the answer to ALL the worlds ills.

  • by vux984 ( 928602 ) on Saturday July 26, 2008 @01:28PM (#24349241)

    Why must EVERY conversation on privacy boil down to a few tired questions about "open source" alternatives ?

    Because open source alternatives shouldn't have backdoors. And if it does they can be identified and closed. The only reason the conversation is tiresome is because proprietary software seems to have a perpetual stream of backdoors that keep keep bringing it up.

    What, like if the source code is open, then that will prevent backdoors ? Erm hello, the client software isn't the problem, it's the network of Skype servers the bloody data passes through that is the weak point in the equation.

    Nobody intelligent is asking for an oss skype client. They are asking for an oss replacement to the entire skype service. For precisely the reason you stated.

    So who do you trust more with your privacy ? A multi million dollar company, or some nerd in his moms basement, acting as a VOIP connectivity server.

    If that nerd is just hosting as a connection service, and the voip data stream itself is end-to-end encrypted and is actually transmitted directly to the recipient, then I trust the nerd in the basement more, because he never even sees the stream, and even if he did, its encrypted.

    At least as long as I know I'm -really- using the public key of the called party to encrypt it, that is. But that is biggest weakness of almost all internet uses of encryption.

    In my case, I'd chose option "none of the above", but really ... open source is not the answer to ALL the worlds ills.

    Not all of them. But it is the answer to this one.

  • by bhima ( 46039 ) * <(Bhima.Pandava) (at) (gmail.com)> on Saturday July 26, 2008 @01:36PM (#24349305) Journal

    What keeps me with Skype is that I can have US telephone number. So no matter where I am my friends and family can call me.
        If there was another service which allowed me to have a US telephone number for incoming calls and let me call any other POTS number I'd use it.

  • by NormalVisual ( 565491 ) on Saturday July 26, 2008 @03:26PM (#24350153)
    This is quite true, which speaks even more strongly for an encrypted RTP stream for VoIP communications. Problem is, if it terminates to a POTS connection anywhere, or you're going through a provider that's subject to CALEA, you're still pretty much hosed. You need to be have an end-to-end encrypted connection with trusted devices/software on each end to be assured of privacy.
  • by Toddlerbob ( 705732 ) on Saturday July 26, 2008 @04:17PM (#24350601)
    I was in China a few years ago, and there was somewhat of a controversy whether or not China would allow Skype or block it. Then, all of a sudden, the Chinese had no problem with Skype. The only way for the Chinese government not to have a problem with Skype is if they are somehow able to monitor it. China is the ultimate surveillance society, after all.

    Therefore, if the Chinese have no problem with Skype, Skype must have a back door.

  • by BitterOak ( 537666 ) on Saturday July 26, 2008 @04:20PM (#24350621)

    The only downside is that there isn't any encryption, so it'd be pretty trivial to bug.

    I'd say that's a pretty huge downside, given the context in which the question was asked!

  • by smchris ( 464899 ) on Sunday July 27, 2008 @11:00AM (#24357975)

    Speaking into the air was the good, old days, isn't it? Wasn't the point of the FISA bill to indemnify the phone companies for past, present and future uses of the permanent listening posts they have built into their facilities in order to better protect our glorious fatherland?

    With Skype, I always figured when it was Estonian, who knew? When it was Ebay, we knew.

Stellar rays prove fibbing never pays. Embezzlement is another matter.

Working...