Sun, 2 November 2008
On Oct 1, 2008 Nart Villeneuve and the Information Warfare Monitor released an interesting joint report titled BREACHING TRUST: An analysis of surveillance and security practices on China’s TOM-Skype platform. Villeneuve is CTO of psiphon inc and the psiphon research fellow at the Citizen Lab, Munk Centre for International Studies, University of Toronto. In this podcast we discuss the report, confidentiality and security issues with TOM-Skype, the Chinese version of Skype
Mike: Gordon, Can you tell us a little more about this report? The Citizen Lab is an interdisciplinary laboratory based at the Munk Centre for International Studies at the University of Toronto, Canada focusing on advanced research and development at the intersection of digital media and world civic politics. The author, Nart Villeneuve's research focuses on International Internet censorship and the evasion tactics used to bypass Internet filtering systems. Other Questions: How about some background on Skype in China? How about some details from the report? You said these are publically accessible servers - can others besides the Chinese access these servers? Can you review the major findings from the report? What kinds of questions has the report raised? How does the report say the sensorship actually works? How about some detail on those servers? The report claims it may be possbile to map users social networks using the logged information. Can you explain? How has Skype responded? |