Today, Mike Qaissaunee and I recorded a podcast on TOM-Skype. Last month I blogged about a report titled BREACHING TRUST: An analysis of surveillance and security practices on China’s TOM-Skype platform. The report was published on Oct 1, 2008 Nart Villeneuve and the Information Warfare Monitor. Villeneuve is CTO of psiphon inc and the psiphon research fellow at the Citizen Lab, Munk Centre for International Studies, University of Toronto. In this 25 minute and 21 second podcast we discuss the report, confidentiality and security issues with TOM-Skype, the Chinese version of Skype.
Here's a list of questions asked during the podcast:
Can you tell us a little more about this report?
How about some background on Skype in China?
How about some details from the report?
You said these are publically accessible servers - can others besides the Chinese access these servers?
Can you review the major findings from the report?
What kinds of questions has the report raised?
How does the report say the sensorship actually works?
How about some detail on those servers?
The report claims it may be possbile to map users social networks using the logged information. Can you explain?
How has Skype responded?
Here's how you can get the answers:
To read show notes and listen to Mike Q and my 25 minute and 21 second podcast (Sept 2006) titled China and TOM-Skype, click here.
Listen to it directly in your web browser by clicking here.
If you have iTunes installed you can subscribe to our podcasts by clicking here.
Sunday, November 2, 2008
China and TOM-Skype Podcast Recorded Today
Posted by Gordon F Snyder Jr at 7:09 PM
Labels: Censorship, China, Filtering, Human Rights, Internet, Internet Censorship, Internet filtering, Security, Skype, Technology, TOM-Skype
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment