November 02, 2008 5:50pm
25m
On Oct 1, 2008
Nart Villeneuve and the
Information Warfare Monitor released an interesting joint report titled
BREACHING TRUST: An analysis of surveillance and security practices on China’s TOM-Skype platform. Villeneuve is CTO of
psiphon inc and the psiphon research fellow at the
Citizen Lab, Munk Centre for International Studies, University of Toronto. In this podcast we discuss the report, confidentiality and security issues with
TOM-Skype, the Chinese version of
SkypeMike: Gordon, Can you tell us a little more about this report?The Citizen Lab is an interdisciplinary laboratory based at the
Munk Centre for International Studies
at the University of Toronto, Canada focusing on advanced research and
development at the intersection of digital media and world civic
politics. The author,
Nart Villeneuve's research focuses on International Internet censorship and the evasion tactics used to bypass Internet filtering systems.
Other Questions:
How about some background on Skype in China?
How about some details from the report?
You said these are publically accessible servers - can others besides the Chinese access these servers?
Can you review the major findings from the report?
What kinds of questions has the report raised?How does the report say the sensorship actually works?How about some detail on those servers?The report claims it may be possbile to map users social networks using the logged information. Can you explain? How has Skype responded?