Stories
Slash Boxes
Comments

SoylentNews is people

posted by Fnord666 on Friday January 12, @04:41PM   Printer-friendly
from the in-band-signaling dept.

Skype finally getting end-to-end encryption

Since its inception, Skype has been notable for its secretive, proprietary algorithm. It's also long had a complicated relationship with encryption: encryption is used by the Skype protocol, but the service has never been clear exactly how that encryption was implemented or exactly which privacy and security features it offers.

That changes today in a big way. The newest Skype preview now supports the Signal protocol: the end-to-end encrypted protocol already used by WhatsApp, Facebook Messenger, Google Allo, and, of course, Signal. Skype Private Conversations will support text, audio calls, and file transfers, with end-to-end encryption that Microsoft, Signal, and, it's believed, law enforcement agencies cannot eavesdrop on.

Presently, Private Conversations are only available in the Insider builds of Skype.

Also at The Register, The Verge, and Wired.


Original Submission

 
Display Options Threshold/Breakthrough

Reply to Comment

Mark All as Read

Mark All as Unread

The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2, Interesting) by cwadge on Saturday January 13, @03:05AM

    by cwadge (3324) on Saturday January 13, @03:05AM (#621665) Homepage Journal
    Skype is a complex, probably intentionally obfuscated mess. It is a breeding ground for security vulnerabilities. Encryption, in this case, may just serve to add the impression of safety more than actually providing it. I personally know a lot of folks who've had their systems compromised via Skype, with their entire systems being compromised as a result. Nude pictures leaked, contents of rather personal conversations, the works. Thus humble my suggestion regarding Skype:
    1. Don't run Skype. Don't even install it.
    2. If you must run Skype for some reason, don't leave your account logged in, don't let it run in the background and, on systems with granular controls, don't give it any permissions it doesn't absolutely need to function. In fact, run it in a dedicated VM if you can.
    3. Presume all Skype interactions are compromised.
    Starting Score:    1  point
    Moderation   +1  
       Interesting=1, Total=1
    Extra 'Interesting' Modifier   0  

    Total Score:   2