From: Jeff Liebermann on
On Sun, 25 Oct 2009 05:14:17 +0000, Larry <noone(a)home.com> wrote:

>Download TCPView from the net and install it. Take a look for
>yourselves the shitstorm of Skype IPs that are used on every call. It
>must be a government nightmare....worldwide.

Skype uses a distributed directory, rather than a centralized
directory server. In order to run such a distributed system, each
client shares some of the load resulting in considerable traffic. Very
roughly, each Skype client services between zero and several hundred
directory lookups (supernode), depending on bandwidth. For the
average broadband user, the bandwidth used is about 5Kbit/sec. If you
have a fat pipe, you can disable supernode functionality with a
registry hack in Skype version 3.0 and up.

Anyway, this has nothing to do with VoIP sniffing on the iPhone. We
don't even know if the target application is really Skype or some
other VoIP application.

It might be a virus or trojan residing on the client computer.
<http://www.physorg.com/news171131038.html>
That would be trivial as it would catch the digitized audio directly
from the sound card, before Skype even sees it. It's been done for
recording streaming music, essentially by tapping the clients sound
card. For example:
<http://www.totalrecorder.com/productfr_tr.htm>
If the target VoIP software uses the sound card, I see no reason why
such software could not be used to deliver (i.e. wiretap) the session
in real time.



--
Jeff Liebermann jeffl(a)cruzio.com
150 Felker St #D http://www.LearnByDestroying.com
Santa Cruz CA 95060 http://802.11junk.com
Skype: JeffLiebermann AE6KS 831-336-2558
From: Larry on
Jeff Liebermann <jeffl(a)cruzio.com> wrote in
news:1739e5pakd3spurloajhnke6jibmp9ninv(a)4ax.com:

>
> <http://www.totalrecorder.com/productfr_tr.htm>
> If the target VoIP software uses the sound card, I see no reason why
> such software could not be used to deliver (i.e. wiretap) the session
> in real time.
>

Total Recorder works quite well both transmit and receive on Skype
calls....

If they got a virus in that would work. Maybe there's ALREADY a virus in a
new Iphone to do just that. God, that'd make a headline Apple would
regret, wouldn't it. Even the apologist fanbois would be furious!

--
Larry

From: Larry on
John Blutarsky <bluto(a)faber.com> wrote in
news:Xns9CAF5306F4C6Ablutofabercom(a)188.40.43.213:

> All easily done
> by sniffing the hotspot you're computer is using at the time

Ok, we ARE talking about VoIP calls, not sellphone calls which are easily
monitored by design at the central switch. We're NOT hooked up to the same
hotspot all the time. Every connection I make to Cricket is a new IP
across a vast range of LEAP Communications IPs, even on the same Cricket
tower. AT home, anyone interested in security is using Ethernet, not wifi,
on a real computer, not a toyphone, confounding the scanners.

Even then, if you make the call from home and they KNOW what channel wifi
you're using, they have to scan 65,535 PORTS and try to figure out which
one of the active ones is used by the randomized, 256-bit encrypted Skype
noise. This takes TIME. TIME they don't have! My call to Mom is only 5
minutes long. The time used by the shitstorm of port calls on my initial
CALL press on Skype is less than a second on a huge range of IPs and PORTS
across my wifi connection, as listed in my other post of an actual call.
The key is long gone before they even figure out I'm making a call.

You guys watch way too many spy movies and give the government hacks way
too much credit. I know some NSA guys and have known them for years.
They're not that smart, really! Throwing money and massive computers at
this isn't going to be any better than the dumbest programmer in the
office. Notice how the articles say they are STILL trying to crack
it....after how many years of Skype? Duhh...


--
Larry

From: John Blutarsky on
Larry <noone(a)home.com> wrote in
news:Xns9CAF95CCD9743noonehomecom(a)74.209.131.13:


>
> You guys watch way too many spy movies and give the government hacks
> way too much credit.


So says the alt.cellular.* bulk tinfoil buyer.
From: nospam on
In article <slrnhea7cp.1p0.dcferguson(a)akit-ferguson.com>, Dennis
Ferguson <dcferguson(a)pacbell.net> wrote:

> Of course iPhone applications in
> particular could also secure this stuff by sending it over the 3G
> phone company connection rather than WiFi, but I don't think Apple's
> restrictions on what applications can do on the phone are there
> to protect their users' best interests.

there is no longer any restriction for using voip over 3g.