Difference between revisions of "SKYPE"
From Buggedplanet.info
Jump to navigationJump to searchLine 1: | Line 1: | ||
= Interception related Appearances / Articles = | = Interception related Appearances / Articles = | ||
+ | |||
+ | == 2013 == | ||
{|border=1 | {|border=1 | ||
Line 30: | Line 32: | ||
|- | |- | ||
|20130308||businessweek.com||[http://www.businessweek.com/articles/2013-03-08/skypes-been-hijacked-in-china-and-microsoft-is-o-dot-k-dot-with-it Cybersecurity: Skype's Been Hijacked in China, and Microsoft Is O.K. With It]||[[SKYPE]] / [[CN]] | |20130308||businessweek.com||[http://www.businessweek.com/articles/2013-03-08/skypes-been-hijacked-in-china-and-microsoft-is-o-dot-k-dot-with-it Cybersecurity: Skype's Been Hijacked in China, and Microsoft Is O.K. With It]||[[SKYPE]] / [[CN]] | ||
+ | |- | ||
+ | |} | ||
+ | |||
+ | == 2012 == | ||
+ | |||
+ | {|border=1 | ||
+ | |- | ||
+ | |Date||Source||Title||Tags | ||
|- | |- | ||
|04.11.2012||nu.nl||[http://www.nu.nl/internet/2950158/skype-hands-16-year-olds-personal-information-to-it-company.html Skype hands 16-year-old's personal information to IT company]||[[SKYPE]] | |04.11.2012||nu.nl||[http://www.nu.nl/internet/2950158/skype-hands-16-year-olds-personal-information-to-it-company.html Skype hands 16-year-old's personal information to IT company]||[[SKYPE]] | ||
Line 42: | Line 52: | ||
|- | |- | ||
|15.01.2012||ijure.org||[http://ijure.org/wp/archives/808 Skype dürfte eine Abhörschnittstelle bieten – Quellen-TKÜ per Trojaner unverhältnismäßig]||[[SKYPE]] | |15.01.2012||ijure.org||[http://ijure.org/wp/archives/808 Skype dürfte eine Abhörschnittstelle bieten – Quellen-TKÜ per Trojaner unverhältnismäßig]||[[SKYPE]] | ||
+ | |- | ||
+ | |} | ||
+ | |||
+ | == 2011 == | ||
+ | |||
+ | {|border=1 | ||
+ | |- | ||
+ | |Date||Source||Title||Tags | ||
|- | |- | ||
|25.11.2011||cryptome.org||[http://cryptome.org/isp-spy/skype-log-spy.pdf Skype Log File Analysis]||[[SKYPE]] | |25.11.2011||cryptome.org||[http://cryptome.org/isp-spy/skype-log-spy.pdf Skype Log File Analysis]||[[SKYPE]] | ||
|- | |- | ||
|01.06.2011||Wall Street Journal||[http://online.wsj.com/article/SB10001424052702304520804576345970862420038.html Mideast Uses Western Tools to Battle the Skype Rebellion]||[[SKYPE]] [[FINFISHER]] [[GAMMA]] [[EG]] [[OM]] [[SA]] [[CN]] | |01.06.2011||Wall Street Journal||[http://online.wsj.com/article/SB10001424052702304520804576345970862420038.html Mideast Uses Western Tools to Battle the Skype Rebellion]||[[SKYPE]] [[FINFISHER]] [[GAMMA]] [[EG]] [[OM]] [[SA]] [[CN]] | ||
+ | |- | ||
+ | |} | ||
+ | |||
+ | == 2010 == | ||
+ | |||
+ | {|border=1 | ||
+ | |- | ||
+ | |Date||Source||TItle||Tags | ||
|- | |- | ||
|17.08.2010||lawblog.de||[http://www.lawblog.de/index.php/archives/2010/08/17/skype-staat-hort-mit/ Skype: Staat hört mit]||[[SKYPE]] [[DE]] | |17.08.2010||lawblog.de||[http://www.lawblog.de/index.php/archives/2010/08/17/skype-staat-hort-mit/ Skype: Staat hört mit]||[[SKYPE]] [[DE]] | ||
+ | |- | ||
+ | |} | ||
+ | |||
+ | == 2008 == | ||
+ | |||
+ | {|border=1 | ||
+ | |- | ||
+ | |Date||Source||Title||Tags | ||
|- | |- | ||
|03.10.2008||Spiegel||[http://www.spiegel.de/netzwelt/web/0,1518,582114,00.html Netz-Überwachung: Verdächtige Texte von Millionen Skype-Nutzern in China gespeichert]||[[SKYPE]] [[CN]] | |03.10.2008||Spiegel||[http://www.spiegel.de/netzwelt/web/0,1518,582114,00.html Netz-Überwachung: Verdächtige Texte von Millionen Skype-Nutzern in China gespeichert]||[[SKYPE]] [[CN]] | ||
Line 54: | Line 88: | ||
|- | |- | ||
|2008||nartv.org||[http://www.nartv.org/mirror/breachingtrust.pdf An analysis of surveillance and security practices on China's TOM-Skype platform]||[[SKYPE]] [[CN]] | |2008||nartv.org||[http://www.nartv.org/mirror/breachingtrust.pdf An analysis of surveillance and security practices on China's TOM-Skype platform]||[[SKYPE]] [[CN]] | ||
+ | |- | ||
+ | |} | ||
+ | |||
+ | == 2007 == | ||
+ | |||
+ | {|border=1 | ||
+ | |- | ||
+ | |Date||Source||Title||Tags | ||
|- | |- | ||
|29.10.2007||cryptome.org||[http://cryptome.org/isp-spy/skype-spy.pdf Skype: Responding to Law Enforcement Records Requests]||[[SKYPE]] | |29.10.2007||cryptome.org||[http://cryptome.org/isp-spy/skype-spy.pdf Skype: Responding to Law Enforcement Records Requests]||[[SKYPE]] | ||
+ | |- | ||
+ | |} | ||
+ | |||
+ | == 2006 == | ||
+ | |||
+ | {|border=1 | ||
+ | |- | ||
+ | |Date||Source||Title||Tags | ||
|- | |- | ||
|25.08.2006||engadget.com||[http://www.engadget.com/2006/08/25/fugitives-skype-call-leads-to-his-arrest/ Fugitive's Skype call leads to his arrest]||[[SKYPE]] | |25.08.2006||engadget.com||[http://www.engadget.com/2006/08/25/fugitives-skype-call-leads-to-his-arrest/ Fugitive's Skype call leads to his arrest]||[[SKYPE]] |
Revision as of 03:16, 13 October 2013
2013
2012
Date | Source | Title | Tags |
04.11.2012 | nu.nl | Skype hands 16-year-old's personal information to IT company | SKYPE |
31.07.2012 | zeit.de | ÜBERWACHUNG: Wie abhörsicher ist Skype wirklich? Branchenkenner stellen die Abhörsicherheit von Skype infrage – wegen der Übernahme durch Microsoft. Nutzer müssen Skype vertrauen oder Alternativen wählen. | SKYPE |
26.07.2012 | paranoia.dubfire.net | The known unknowns of Skype interception | SKYPE |
20120725 | networkworld.com | Skype hoses down eavesdropping concerns - Privacy unaffected by architecture change, says Microsoft-owned online video chat and calling company | SKYPE |
02.05.2012 | eff.org | Fake Skype Encryption Tool Targeted at Syrian Activists Promises Security, Delivers Spyware | SKYPE SY |
15.01.2012 | ijure.org | Skype dürfte eine Abhörschnittstelle bieten – Quellen-TKÜ per Trojaner unverhältnismäßig | SKYPE |
2011
Date | Source | Title | Tags |
25.11.2011 | cryptome.org | Skype Log File Analysis | SKYPE |
01.06.2011 | Wall Street Journal | Mideast Uses Western Tools to Battle the Skype Rebellion | SKYPE FINFISHER GAMMA EG OM SA CN |
2010
Date | Source | TItle | Tags |
17.08.2010 | lawblog.de | Skype: Staat hört mit | SKYPE DE |
2008
Date | Source | Title | Tags |
03.10.2008 | Spiegel | Netz-Überwachung: Verdächtige Texte von Millionen Skype-Nutzern in China gespeichert | SKYPE CN |
25.01.2008 | tagesspiegel.de | Online-Durchsuchungen: Bayerischer Trojaner gegen Skype | SKYPE DIGITASK |
2008 | nartv.org | An analysis of surveillance and security practices on China's TOM-Skype platform | SKYPE CN |
2007
Date | Source | Title | Tags |
29.10.2007 | cryptome.org | Skype: Responding to Law Enforcement Records Requests | SKYPE |
2006
Date | Source | Title | Tags |
25.08.2006 | engadget.com | Fugitive's Skype call leads to his arrest | SKYPE |
Unknown | cs.gmu.edu | Tracking Anonymous Peer-to-Peer VoIP Calls on the Internet |
Technical Ressources
Date | Source | Title | Tags |
20110623 | uspto.gov | United States Patent Application 20110153809 Kind Code A1 Ghanem; George ; et al. June 23, 2011 - Legal Intercept | SKYPE Lawful Interception |