Xavin":1n49m7ze said:You can't really blame MS for that, as a large US company they are going to cooperate with warrants, and cooperating without warrants is still a very grey area right now until we get more case-law. If you want secure internet communication, use end to end encryption, period, there are dozens of options.Prior to MSFT buying it, Skype was one of the easiest, most prominent, and most secure options available. Despite countless attempts, no government was able to get the backdoor access they kept requesting. This changed with the buyout, like I said it would.
belleg":2ukgl2ua said:sporkwitch":2ukgl2ua said:Let me know how useful the intercepted data is in 2050 when they break the encryption on it. I didn't say anything about interception, I was talking about access, as in to the plaintext content, not the ciphertext.belleg":2ukgl2ua said:sporkwitch":2ukgl2ua said:Prior to MSFT buying it, Skype was one of the easiest, most prominent, and most secure options available. Despite countless attempts, no government was able to get the backdoor access they kept requesting. This changed with the buyout, like I said it would.Xavin":2ukgl2ua said:Any criminal who conducts business over Skype pretty much deserves to get caught. There are dozens of communication methods that the police probably don't even know exist, if you use one that's popular and centralized, you are dumb.
Would you bet your life on that statement? Because, I know for a fact that everything can be intercepted with a warrant or ...
If I'm doing something nefarious, you can bet your sweet ass they'll have to break encryption. In fact, anyone reading this could use my public key to encrypt a message that would be very difficult to break.belleg":2rzf5633 said:They don't have to break the encryption. Lawful Access provisioning requires that the data is handled to the law enforcing agencies in a readable format with a warrant. Under US laws, the company rejecting to provide this is liable and trust me no company wants to be in that position. I know this for a fact because I work in this field. {snip}
Jabber supports all of that and more, with amazing control and routing options. That's why I asked about the voice and video abilities earlier.AxMi-24":2no5mqe5 said:Xavin":2no5mqe5 said:You can't really blame MS for that, as a large US company they are going to cooperate with warrants, and cooperating without warrants is still a very grey area right now until we get more case-law. If you want secure internet communication, use end to end encryption, period, there are dozens of options.Prior to MSFT buying it, Skype was one of the easiest, most prominent, and most secure options available. Despite countless attempts, no government was able to get the backdoor access they kept requesting. This changed with the buyout, like I said it would.
What other options are there? I've been looking and there is nothing that is even remotely user friendly. Skype supports login from many locations at the same time and all chat and history gets synced to all computers. Just that is unique and makes it by far best IM.
Add encryption (even with this new stuff it's by far better than anyone else as others have no encryption what so ever).
I would love to switch to something safe but there is just nothing.
sporkwitch":xt0lcfo6 said:belleg":xt0lcfo6 said:sporkwitch":xt0lcfo6 said:Let me know how useful the intercepted data is in 2050 when they break the encryption on it. I didn't say anything about interception, I was talking about access, as in to the plaintext content, not the ciphertext.belleg":xt0lcfo6 said:sporkwitch":xt0lcfo6 said:Prior to MSFT buying it, Skype was one of the easiest, most prominent, and most secure options available. Despite countless attempts, no government was able to get the backdoor access they kept requesting. This changed with the buyout, like I said it would.Xavin":xt0lcfo6 said:Any criminal who conducts business over Skype pretty much deserves to get caught. There are dozens of communication methods that the police probably don't even know exist, if you use one that's popular and centralized, you are dumb.
Would you bet your life on that statement? Because, I know for a fact that everything can be intercepted with a warrant or ...
They don't have to break the encryption. Lawful Access provisioning requires that the data is handled to the law enforcing agencies in a readable format with a warrant. Under US laws, the company rejecting to provide this is liable and trust me no company wants to be in that position. I know this for a fact because I work in this field.
Whatever you hear that company A or Company B does not provide data, etc. to the law enforcing agencies is very far from the truth[/quo..te]
You don't seem to understand how Skype work(s/ed). Calls are encrypted end to end, with a one-time key generated at call start, which was passed directly between parties, not via skype supernodes or servers as a middle man. Skype was quite literally incapable of providing what governments wanted without completely reworking things and destroying its security integrity.
So yes, any intercepted comms would have to be cracked, hence my post. Now that they're in the US since MSFT owns them, the government can force such changes (and they already started them by switching from supernodes to centrally-controlled MSFT servers.)
sporkwitch":33wlxtoz said:What about for operating systems that don't suck?SirMarth01":33wlxtoz said:Thanks to ZRTP and SRTP, you can use the Jingle extension of XMPP to allow encrypted voice and video chat.sporkwitch":33wlxtoz said:Does jabber have a compatible voice or video protocol? I'm liking the vision of a mesh future with directly routed comms and end-to-end encryption.
The only good client for Windows seems to be Jitsi. Jitsi also supports OTR for chat encryption.
sporkwitch":25iwwiii said:Jabber supports all of that and more, with amazing control and routing options. That's why I asked about the voice and video abilities earlier.AxMi-24":25iwwiii said:Xavin":25iwwiii said:You can't really blame MS for that, as a large US company they are going to cooperate with warrants, and cooperating without warrants is still a very grey area right now until we get more case-law. If you want secure internet communication, use end to end encryption, period, there are dozens of options.Prior to MSFT buying it, Skype was one of the easiest, most prominent, and most secure options available. Despite countless attempts, no government was able to get the backdoor access they kept requesting. This changed with the buyout, like I said it would.
What other options are there? I've been looking and there is nothing that is even remotely user friendly. Skype supports login from many locations at the same time and all chat and history gets synced to all computers. Just that is unique and makes it by far best IM.
Add encryption (even with this new stuff it's by far better than anyone else as others have no encryption what so ever).
I would love to switch to something safe but there is just nothing.
Mumble is also a potential option, assuming a trusted server and proper settings to control access and prevent recording.
I'll concede that for sent messages, but by default (unless the sender or user set it differently) all messages to you will go to all clients, and there's no prohibition (unless set server-side) on logging in multiple simultaneous clients.AxMi-24":qi9ldiff said:sporkwitch":qi9ldiff said:Jabber supports all of that and more, with amazing control and routing options. That's why I asked about the voice and video abilities earlier.AxMi-24":qi9ldiff said:Xavin":qi9ldiff said:You can't really blame MS for that, as a large US company they are going to cooperate with warrants, and cooperating without warrants is still a very grey area right now until we get more case-law. If you want secure internet communication, use end to end encryption, period, there are dozens of options.Prior to MSFT buying it, Skype was one of the easiest, most prominent, and most secure options available. Despite countless attempts, no government was able to get the backdoor access they kept requesting. This changed with the buyout, like I said it would.
What other options are there? I've been looking and there is nothing that is even remotely user friendly. Skype supports login from many locations at the same time and all chat and history gets synced to all computers. Just that is unique and makes it by far best IM.
Add encryption (even with this new stuff it's by far better than anyone else as others have no encryption what so ever).
I would love to switch to something safe but there is just nothing.
Mumble is also a potential option, assuming a trusted server and proper settings to control access and prevent recording.
None of jabber clients supports loging in from different locations at the same time and syncing them all. I've been looking for that feature for a long time. I'm also not the only one.
Jitsi works on Windows, Mac OS X, and Linux. (Wikipedia claims BSD support, but I've found no reference to such on the official website.)sporkwitch":sw4erg7u said:What about for operating systems that don't suck?SirMarth01":sw4erg7u said:Thanks to ZRTP and SRTP, you can use the Jingle extension of XMPP to allow encrypted voice and video chat.sporkwitch":sw4erg7u said:Does jabber have a compatible voice or video protocol? I'm liking the vision of a mesh future with directly routed comms and end-to-end encryption.
The only good client for Windows seems to be Jitsi. Jitsi also supports OTR for chat encryption.
On this subject, apparently, I do, as it's been a thorn in the side of the US government for years.belleg":3cxrbfsj said:Right... you know better than me![]()
sporkwitch":1x8bciwk said:I'll concede that for sent messages, but by default (unless the sender or user set it differently) all messages to you will go to all clients, and there's no prohibition (unless set server-side) on logging in multiple simultaneous clients.AxMi-24":1x8bciwk said:sporkwitch":1x8bciwk said:Jabber supports all of that and more, with amazing control and routing options. That's why I asked about the voice and video abilities earlier.AxMi-24":1x8bciwk said:Xavin":1x8bciwk said:You can't really blame MS for that, as a large US company they are going to cooperate with warrants, and cooperating without warrants is still a very grey area right now until we get more case-law. If you want secure internet communication, use end to end encryption, period, there are dozens of options.Prior to MSFT buying it, Skype was one of the easiest, most prominent, and most secure options available. Despite countless attempts, no government was able to get the backdoor access they kept requesting. This changed with the buyout, like I said it would.
What other options are there? I've been looking and there is nothing that is even remotely user friendly. Skype supports login from many locations at the same time and all chat and history gets synced to all computers. Just that is unique and makes it by far best IM.
Add encryption (even with this new stuff it's by far better than anyone else as others have no encryption what so ever).
I would love to switch to something safe but there is just nothing.
Mumble is also a potential option, assuming a trusted server and proper settings to control access and prevent recording.
None of jabber clients supports loging in from different locations at the same time and syncing them all. I've been looking for that feature for a long time. I'm also not the only one.
sporkwitch":8fl178va said:On this subject, apparently, I do, as it's been a thorn in the side of the US government for years.belleg":8fl178va said:Right... you know better than me![]()
[crickets]Biggiesized":3c3llmb5 said:So what forms of video communication AREN'T cracked/intercepted yet?
Biggiesized":1a97b9yd said:So what forms of video communication AREN'T cracked/intercepted yet?
sporkwitch":xnsmnprl said:Don't forget Uncle George "Dubya," most of the true dangers right now got their start when his regime was in charge; the current one just pulled 180's and fought to protect those unconstitutional changes that they swore they'd repeal if elected.
dlux":xnsmnprl said:Beginning?!?
Were you, by any chance, in a coma for the past twenty or so years?
(Hell, let's go back to the McCarthy era for some refreshers on how it's done.)
kleinma":xnsmnprl said:I am just going on the fact that if the feds want to listen to my skype convos, then they are more than welcome. I am a law abiding tax paying citizen, and I never, ever had any expectation of true privacy across any electronic medium. I keep hearing these increased cries about no privacy, and then those people go off and tweet and post on facebook everything about their lives.
sporkwitch":3b3cwqrp said:What about for operating systems that don't suck?SirMarth01":3b3cwqrp said:Thanks to ZRTP and SRTP, you can use the Jingle extension of XMPP to allow encrypted voice and video chat.sporkwitch":3b3cwqrp said:Does jabber have a compatible voice or video protocol? I'm liking the vision of a mesh future with directly routed comms and end-to-end encryption.
The only good client for Windows seems to be Jitsi. Jitsi also supports OTR for chat encryption.
kleinma":2s32uev8 said:So I should stop running my drug and prostitution rings over skype?
kleinma":3317bvze said:I would be interested to know how you all would feel in the event some major terrorist plot was thwarted because of lawful wiretapping on a skype call.
What I want to ask kleinma is which kinds of terrorists use skype to plan attacks? There are far better methods to communicate.Postulator":1jg7enu8 said:kleinma":1jg7enu8 said:I would be interested to know how you all would feel in the event some major terrorist plot was thwarted because of lawful wiretapping on a skype call.
Absolutely amazed.
So yeah, still not seeing private keys leaving local machines (though I apparently was mistaken about passing it through the login server; I suspect this is a more recent change with the abandonment of supernodes, though, as it seems to contradict Skype's prior statements on the topic).belleg":35r5x2vo said:[snip]
Was on my tablet at the time, checking wasn't particularly practical.jpcg":35r5x2vo said:Go to their Website. They are also supported (Mac OS and some Linux have precompiled packages)
Edit: Sadly it runs on Java, I won't install it/can't try it out. (Mac OS X 10.8)
sporkwitch":7e9edg3f said:Does jabber have a compatible voice or video protocol? I'm liking the vision of a mesh future with directly routed comms and end-to-end encryption.
kleinma":1tc1qirw said:I would be interested to know how you all would feel in the event some major terrorist plot was thwarted because of lawful wiretapping on a skype call.
Postulator":3bsd2nm1 said:Why are so many idiots insistent that only criminals should be scared by governments taking away basic human rights and liberties?
sporkwitch":1zjerz7a said:This is the part where I say "I told you so." The US has been trying to get this access for years, without success, because they weren't an american company. As soon as the MSFT buyout was announced, this is the exact result I'd said would happen. Now it has. This is why I stopped any real use of skype the day the purchase was approved.
Does jabber have a compatible voice or video protocol? I'm liking the vision of a mesh future with directly routed comms and end-to-end encryption.
Honestly, I keep forgetting that they're allowed to charge for the extra-legal (and even legal) access. The potential to actively profit from kowtowing to government hadn't occurred to me, I just saw the US finally getting what they want as a side-effect of the purchase.lucianarmasu":74rcvw3q said:sporkwitch":74rcvw3q said:This is the part where I say "I told you so." The US has been trying to get this access for years, without success, because they weren't an american company. As soon as the MSFT buyout was announced, this is the exact result I'd said would happen. Now it has. This is why I stopped any real use of skype the day the purchase was approved.
Does jabber have a compatible voice or video protocol? I'm liking the vision of a mesh future with directly routed comms and end-to-end encryption.
Exactly. No wonder Microsoft made a crazy bid of double the one of the next competitor. They know they will be getting their billions back by selling access to their Skype users to NSA/the Government.
http://www.theregister.co.uk/2009/02/12 ... pe_pwnage/
sporkwitch":2py08j9a said:So yeah, still not seeing private keys leaving local machinesbelleg":2py08j9a said:[snip]
You have no clue how PKIs work, do you? They're called public keys for a reason: you give them to everyone and their mother, so that they can send things securely to you so only you can decrypt it. Sign it with your private key, and they can use your public key to verify that it was in fact you that sent it.idonthaveaname":te27uysl said:sporkwitch":te27uysl said:So yeah, still not seeing private keys leaving local machinesbelleg":te27uysl said:[snip]
It doesn't matter. The public keys are distributed and signed (and this is the important part) by the central servers. The chain of trust ends with Skype themselves. That combined with the software being closed and extremely obfuscated means that if Skype wanted to they could easily mount a MITM attack on an individual user and the likelihood of anybody noticing is slim to none. This has always been the case.
So, Skype can (and has always been able to) effectively snoop on any user if they wanted to or if they were forced to by some means.
Xavin":26dxbmmr said:Any criminal who conducts business over Skype pretty much deserves to get caught. There are dozens of communication methods that the police probably don't even know exist, if you use one that's popular and centralized, you are dumb.
Well, you've got the "look at all your shit" clause in the Windows EULA that's already giving MSFT access to all that, and §215 I think it is of the PATRIOT ACT which grants government warrantless access to "business records."igor.levicki":12ib057g said:Xavin":12ib057g said:Any criminal who conducts business over Skype pretty much deserves to get caught. There are dozens of communication methods that the police probably don't even know exist, if you use one that's popular and centralized, you are dumb.
And what about legal businesses who use Skype for collaboration? Their trade secrets and confidential information now being available to the government and maybe to other competing companies if they "give a donation" to the right person or party?
sporkwitch":17yjr92m said:Well, you've got the "look at all your shit" clause in the Windows EULA that's already giving MSFT access to all that, and §215 I think it is of the PATRIOT ACT which grants government warrantless access to "business records."igor.levicki":17yjr92m said:Xavin":17yjr92m said:Any criminal who conducts business over Skype pretty much deserves to get caught. There are dozens of communication methods that the police probably don't even know exist, if you use one that's popular and centralized, you are dumb.
And what about legal businesses who use Skype for collaboration? Their trade secrets and confidential information now being available to the government and maybe to other competing companies if they "give a donation" to the right person or party?
Prior version wasn't quite so restricted, though even the definition given can be abused just as much as the "business records" line in the PATRIOT ACT.jdale":dorcg13n said:sporkwitch":dorcg13n said:Well, you've got the "look at all your shit" clause in the Windows EULA that's already giving MSFT access to all that, and §215 I think it is of the PATRIOT ACT which grants government warrantless access to "business records."igor.levicki":dorcg13n said:Xavin":dorcg13n said:Any criminal who conducts business over Skype pretty much deserves to get caught. There are dozens of communication methods that the police probably don't even know exist, if you use one that's popular and centralized, you are dumb.
And what about legal businesses who use Skype for collaboration? Their trade secrets and confidential information now being available to the government and maybe to other competing companies if they "give a donation" to the right person or party?
Citation needed....
It actually says 7. "b. Use of Information. Microsoft may use the computer information, accelerator information, search suggestions information, error reports, and Malware reports to improve our software and services. We may also share it with others, such as hardware and software vendors. They may use the information to improve how their products run with Microsoft software."
There is some potential for sharing although not content of your hard drive, etc. ("Computer information" is defined in 7.a. and very limited.) I don't think that resembles what you are saying.
Actual Windows 7 EULA: download.microsoft.com/Documents/UseTerms/Windows%207_Professional_English_b7a7153f-1a6c-498c-9350-c86926bb1aa9.pdf
sporkwitch":myzmlmdi said:You have no clue how PKIs work, do you? They're called public keys for a reason: you give them to everyone and their mother, so that they can send things securely to you so only you can decrypt it. Sign it with your private key, and they can use your public key to verify that it was in fact you that sent it.idonthaveaname":myzmlmdi said:sporkwitch":myzmlmdi said:So yeah, still not seeing private keys leaving local machinesbelleg":myzmlmdi said:[snip]
It doesn't matter. The public keys are distributed and signed (and this is the important part) by the central servers. The chain of trust ends with Skype themselves. That combined with the software being closed and extremely obfuscated means that if Skype wanted to they could easily mount a MITM attack on an individual user and the likelihood of anybody noticing is slim to none. This has always been the case.
So, Skype can (and has always been able to) effectively snoop on any user if they wanted to or if they were forced to by some means.
Without the private key, you must crack the encryption on anything sent using your public key, which would take significantly longer than obtaining a warrant (generally), thus serving the purpose of protecting our right to privacy. The only thing Skype can do with your public key is send you encrypted data that you could then open. It doesn't grant skype the ability to open anything encrypted with your public key and read its contents; that requires your private key.
For more information about PKE, check out wikipedia: http://en.wikipedia.org/wiki/Public-key_cryptography
And yet we have sufficient steps in the process that was linked that such validation is possible, or at least was before moving to the server model that undermined the whole thing. That was part of the point of generating them on a per-session basis and routing them directly between the participants, rather than through servers or super-nodes: minimize the chance of a MITM.idonthaveaname":2wa2zm7l said:sporkwitch":2wa2zm7l said:You have no clue how PKIs work, do you? They're called public keys for a reason: you give them to everyone and their mother, so that they can send things securely to you so only you can decrypt it. Sign it with your private key, and they can use your public key to verify that it was in fact you that sent it.idonthaveaname":2wa2zm7l said:sporkwitch":2wa2zm7l said:So yeah, still not seeing private keys leaving local machinesbelleg":2wa2zm7l said:[snip]
It doesn't matter. The public keys are distributed and signed (and this is the important part) by the central servers. The chain of trust ends with Skype themselves. That combined with the software being closed and extremely obfuscated means that if Skype wanted to they could easily mount a MITM attack on an individual user and the likelihood of anybody noticing is slim to none. This has always been the case.
So, Skype can (and has always been able to) effectively snoop on any user if they wanted to or if they were forced to by some means.
Without the private key, you must crack the encryption on anything sent using your public key, which would take significantly longer than obtaining a warrant (generally), thus serving the purpose of protecting our right to privacy. The only thing Skype can do with your public key is send you encrypted data that you could then open. It doesn't grant skype the ability to open anything encrypted with your public key and read its contents; that requires your private key.
For more information about PKE, check out wikipedia: http://en.wikipedia.org/wiki/Public-key_cryptography
Either you misunderstood me or you're the one who has no clue how PKI works. Yes, they are public but if you cannot reliably authenticate the public key it is useless. In a PKI the public key is signed by a certificate authority which is the way of saying that public key A really belongs to entity B. If that certificate authority is not trustworthy then the whole system collapses. In this case Skype is that authority so you have to trust them to only sign a user's key if they have already verified (using the user's password) that the key belongs to the user. Otherwise a MITM attack becomes trivial.
For more info on MITM see https://en.wikipedia.org/wiki/Man-in-the-middle_attack