[144803] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Source for Skype Trojan released

daemon@ATHENA.MIT.EDU (Stephan Neuhaus)
Fri Sep 4 15:40:21 2009

Cc: Cryptography List <cryptography@metzdowd.com>
From: Stephan Neuhaus <neuhaus@st.cs.uni-sb.de>
To: Jerry Leichter <leichter@lrw.com>
In-Reply-To: <DDB1A7B0-E157-47B9-9B20-CC488E0DA763@lrw.com>
Date: Mon, 31 Aug 2009 20:42:34 +0200


On Aug 31, 2009, at 13:20, Jerry Leichter wrote:

> It can =93...intercept all audio data coming and going to the Skype =20=

> process.=94

Interesting, but is this a novel idea? As far as I can see, the =20
process intercepts the audio before it reaches Skype and after it has =20=

left Skype. Isn't that the same as calling a keylogger a "PGP Trojan"?

Stephan=

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post