TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Reverse engineer extracts Skype crypto secret recipe

23 pointsby rpledgealmost 15 years ago

5 comments

elialmost 15 years ago
Either I'm missing something or this doesn't really seem like that big a deal.<p>Here <a href="http://www.secdev.org/conf/skype_BHEU06.pdf" rel="nofollow">http://www.secdev.org/conf/skype_BHEU06.pdf</a> is a 2006 analysis of Skype that found that "RC4 is used for obfuscation not for privacy." They simply worked around it to continue their reverse engineering. And showed that you don't need to understand it to e.g. build a parallel evil Skype network or overflow a buffer and hack everyone running skype.<p>An impressive feat of reverse engineering given the lengths Skype went to, but I don't quite see how practical it is.
评论 #1505563 未加载
ohashialmost 15 years ago
So what does this mean in practice?
评论 #1505900 未加载
jm3almost 15 years ago
Posted to HN three days ago, here: <a href="http://news.ycombinator.com/item?id=1496726" rel="nofollow">http://news.ycombinator.com/item?id=1496726</a>
tshtfalmost 15 years ago
Source code here:<p><a href="http://cryptolib.com/ciphers/skype/" rel="nofollow">http://cryptolib.com/ciphers/skype/</a>
MichaelGGalmost 15 years ago
The original post is here:<p><a href="http://webcache.googleusercontent.com/search?q=cache:http://www.enrupt.com/index.php/2010/07/07/skype-biggest-secret-revealed" rel="nofollow">http://webcache.googleusercontent.com/search?q=cache:http://...</a>
评论 #1505513 未加载