Prev: HOW TO: Two separate wireless networks on one router (with DD-WRT)
Next: NEWS: Hotspot sniffer eavesdrops on iPhone [VoIP & video] inreal-time
From: Jeff Liebermann on 25 Oct 2009 13:54 On Sun, 25 Oct 2009 05:14:17 +0000, Larry <noone(a)home.com> wrote: >Download TCPView from the net and install it. Take a look for >yourselves the shitstorm of Skype IPs that are used on every call. It >must be a government nightmare....worldwide. Skype uses a distributed directory, rather than a centralized directory server. In order to run such a distributed system, each client shares some of the load resulting in considerable traffic. Very roughly, each Skype client services between zero and several hundred directory lookups (supernode), depending on bandwidth. For the average broadband user, the bandwidth used is about 5Kbit/sec. If you have a fat pipe, you can disable supernode functionality with a registry hack in Skype version 3.0 and up. Anyway, this has nothing to do with VoIP sniffing on the iPhone. We don't even know if the target application is really Skype or some other VoIP application. It might be a virus or trojan residing on the client computer. <http://www.physorg.com/news171131038.html> That would be trivial as it would catch the digitized audio directly from the sound card, before Skype even sees it. It's been done for recording streaming music, essentially by tapping the clients sound card. For example: <http://www.totalrecorder.com/productfr_tr.htm> If the target VoIP software uses the sound card, I see no reason why such software could not be used to deliver (i.e. wiretap) the session in real time. -- Jeff Liebermann jeffl(a)cruzio.com 150 Felker St #D http://www.LearnByDestroying.com Santa Cruz CA 95060 http://802.11junk.com Skype: JeffLiebermann AE6KS 831-336-2558
From: Larry on 25 Oct 2009 14:36 Jeff Liebermann <jeffl(a)cruzio.com> wrote in news:1739e5pakd3spurloajhnke6jibmp9ninv(a)4ax.com: > > <http://www.totalrecorder.com/productfr_tr.htm> > If the target VoIP software uses the sound card, I see no reason why > such software could not be used to deliver (i.e. wiretap) the session > in real time. > Total Recorder works quite well both transmit and receive on Skype calls.... If they got a virus in that would work. Maybe there's ALREADY a virus in a new Iphone to do just that. God, that'd make a headline Apple would regret, wouldn't it. Even the apologist fanbois would be furious! -- Larry
From: Larry on 25 Oct 2009 14:43 John Blutarsky <bluto(a)faber.com> wrote in news:Xns9CAF5306F4C6Ablutofabercom(a)188.40.43.213: > All easily done > by sniffing the hotspot you're computer is using at the time Ok, we ARE talking about VoIP calls, not sellphone calls which are easily monitored by design at the central switch. We're NOT hooked up to the same hotspot all the time. Every connection I make to Cricket is a new IP across a vast range of LEAP Communications IPs, even on the same Cricket tower. AT home, anyone interested in security is using Ethernet, not wifi, on a real computer, not a toyphone, confounding the scanners. Even then, if you make the call from home and they KNOW what channel wifi you're using, they have to scan 65,535 PORTS and try to figure out which one of the active ones is used by the randomized, 256-bit encrypted Skype noise. This takes TIME. TIME they don't have! My call to Mom is only 5 minutes long. The time used by the shitstorm of port calls on my initial CALL press on Skype is less than a second on a huge range of IPs and PORTS across my wifi connection, as listed in my other post of an actual call. The key is long gone before they even figure out I'm making a call. You guys watch way too many spy movies and give the government hacks way too much credit. I know some NSA guys and have known them for years. They're not that smart, really! Throwing money and massive computers at this isn't going to be any better than the dumbest programmer in the office. Notice how the articles say they are STILL trying to crack it....after how many years of Skype? Duhh... -- Larry
From: John Blutarsky on 25 Oct 2009 14:47 Larry <noone(a)home.com> wrote in news:Xns9CAF95CCD9743noonehomecom(a)74.209.131.13: > > You guys watch way too many spy movies and give the government hacks > way too much credit. So says the alt.cellular.* bulk tinfoil buyer.
From: nospam on 25 Oct 2009 23:58
In article <slrnhea7cp.1p0.dcferguson(a)akit-ferguson.com>, Dennis Ferguson <dcferguson(a)pacbell.net> wrote: > Of course iPhone applications in > particular could also secure this stuff by sending it over the 3G > phone company connection rather than WiFi, but I don't think Apple's > restrictions on what applications can do on the phone are there > to protect their users' best interests. there is no longer any restriction for using voip over 3g. |