![]() ![]() Collaborative teamwork was the key to the successful addition of another provider to the PRISM system."Īfter buying Skype, Microsoft dramatically overhauled its architecture, replacing peer-to-peer "super nodes" with thousands of servers run by Microsoft - a more centralized approach that may have made it easier for government eavesdroppers. Another classified document, citing collaboration between NSA and FBI, said: "Feedback indicated that a collected Skype call was very clear and the metadata looked complete. Silent Circle, Off-the-Record Messaging for instant messages, and e-mail messages encrypted with PGP do precisely that.īut few companies take that step, which can be a significant engineering expense and complicated for customers to use. ![]() It's possible for companies to create communications systems using strong end-to-end encryption believed to be proof against government snoops. In any event, because of Skype's peer-to-peer architecture and encryption techniques, Skype would not be able to comply with such a request."ĬNET asked Microsoft Wednesday morning whether that statement was still correct. In 2008, when the company was owned by eBay instead of Microsoft, a Skype spokeswoman told CNET: "We have not received any subpoenas or court orders asking us to perform a live interception or wiretap of Skype-to-Skype communications.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |