Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

By its very nature, eavesdropping on P2P is a tough. How do you monitor all the packets that are routed through different paths? The only way would be Deep Packet Inspection. But again the packets are encrypted with 128 bit key. So even if you get the packets, you'll have a tough time decrypting it.

The Skype binary also is heavily obfuscated. It wont even run if a ring 0 debugger is on your system.

It definitely deserves a billion dollar bounty.




Skype is pretty much based on the Kazaa p2p stack. Which was cracked by quite a few people. It was quite an impressive reasonably secure system, but not rocket science.


Did Kaaza support real time packet transfer? I guess the voice part was added on to Kaaza by the Skype Team. Or the team behind the P2P framework. I forget the name. Its owned by a Estonian Company if I'm right.

But you're right. Its definitely breakable. Kind of challenge that tickles those brain cells.


Um, the best antireversing/antidebugging people in the world still don't have casual game crackers beat. For "a billion dollars", I might substitute "free xbox".


I hear that 'Tom Clancy's Splinter Cell' is kind of annoying to break the protection on :)


Hey, I totally went out and bought that title. I just never got around to it. If you wanted to call me out on it, you might be doing me a favor.

[edit]

Context:

http://rdist.root.org/2007/04/19/anti-debugger-techniques-ar...


I don't see the connection between game cracking and grabbing lots of p2p traffic reliably.


The argument was made that Skype is a hard target, in part because they went through some trouble to obscure the binary. I'm just refuting that portion of the argument.




Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: