VoIP user claims Skype protocol hack

Powered by SC Magazine
 

Chinese firm finds a way into the network.

A Chinese company claims to have reverse-engineered the Skype protocol, allowing it to place calls over Skype's VoIP network. 

According to a post on the VoIPWiki blog, a user by the name of Charlie Paglee received a Skype call from a contact at an unnamed Chinese company.

The calling party used the company's own software to initiate the call, rather than the official Skype client. 

The software currently only supports peer-to-peer phone calls, but the company plans to create a completely compatible Skype client including instant messaging and user status information.

Commenting on the call quality, Paglee wrote: "The first time we talked there was a noticeable echo on my end. The second time the voice quality was crystal clear."

Paglee also noted that the software does not support Skype's Supernode feature, which can route calls through PCs running the Skype client.

"Right now every computer with Skype installed can be used as a relay to carry data between two other computers when both of those computers are only allowed to make outgoing Transmission Control Protocol calls," Paglee wrote.

"This means that very soon Skype users will have an alternative client which will not hijack their computer.

"This could eventually have a very negative effect on the Skype network if too many people choose not to act as Skype Supernodes and the network starts to deteriorate."

Copyright ©v3.co.uk


VoIP user claims Skype protocol hack
 
 
 
Top Stories
Meet FABACUS, Westpac's first computer
GE225 operators celebrate gold anniversary.
 
NSW Govt gets ready to throw out the floppy disks
[Opinion] Dominic Perrottet says its time for government to catch up.
 
iiNet facing new copyright battle with Hollywood
Fighting to protect customer details.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  26%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  22%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  26%
TOTAL VOTES: 344

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  58%
 
No
  42%
TOTAL VOTES: 143

Vote