Researchers ID Skype users who also use BitTorrent
The research chips away at the perceived privacy protections of using Skype's encrypted service
IDG News Service - Entertainment companies seeking to trace people who are illegally file sharing may be interested in new research that could identify filesharers through their Skype accounts. A research team has figured out how to link online Skype users to their activity on peer-to-peer networks, a correlation that could represent a major threat to users' privacy.
The study focused on how a Skype user's IP address can be determined without that user knowing, and then linking that same IP address to files that are being shared through peer-to-peer networks such as BitTorrent.
Using information that users publish in Skype's directory, such as their name, location and birth date, the researchers were able to get very close to identifying the person doing the sharing. They note, however, the method will just identify a machine rather than an actual person behind the computer.
A Skype user's IP address can be figured out even without their knowledge due to a major privacy vulnerability, the researchers wrote. Skype was notified in May -- the same month that it was announced Microsoft had acquired the company -- but the issue has not been fixed.
Skype's Chief Information Security Officer, Adrian Asher, said in an e-mailed statement that "just as with typical internet communications software, Skype users who are connected may be able to determine each other's IP address. Through research and development, we will continue to make advances in this area and improvements to our software."
Skype's peer-to-peer routing system means many machines are involved in setting up a Skype call. But the team figured out a way to sift out the nodes through which calls are routed and determine the user's real IP address by sniffing the packets.
Because Skype uses a proprietary protocol and encrypts the payloads of its messages, packets coming from the called party can't be inspected, the researchers wrote. Instead, they looked at the patterns between a caller and the Skype nodes.
Due to Skype's privacy vulnerability, an IP address could be extracted even if the caller wasn't in the called party's Skype's contact list, or if the caller had been blocked. The researchers also found a way to exchange packets with a user without them ever receiving a notification of a call.
The researchers built a Skype tracker that selected a set of 100,000 identified users. To correlated those IP addresses with files shared on BitTorrent, they also built tools to collect BitTorrent file identifiers, called infohashes, a BitTorrent crawler to collect IP addresses on the network and a verifier to match an online Skype user with an online BitTorrent user.
- Warning: Cloud Data at Risk Experts agree that relying on SaaS vendors to backup and restore your data is dangerous. Yet that's exactly what huge portions of the...
- The Opportunities and Challenges of the Cloud In this report F5 poses questions to IDC analysts, Sally Hudson and Phil Hochmuth, on behalf of F5's customers to better understand the...
- Mobile First: Securing Information Sprawl Learn how the partnership between Box and MobileIron can help you execute a "mobile first" strategy that manages and secures both mobile apps...
- The Truth About Cloud Security "Security" is the number one issue holding business leaders back from the cloud. But does the reality match the perception?
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!