Sigillu

Secure Communications

Sigillu Contact Us Page

July 23, 2010 Posted by | Android, BlackBerry, bugging devices, Canada, cellular phone, contraespionaje, correo electronico, countersurveillance, criptografia, dispositivos de escucha, eavesdrop, email, email, encryption, escuchas telefonicas, espionage, espionaje, ilegal, illegal, inalambrico, intercepcion, Iphone, mensajes de texto, mobile, Nextel, Nokia, PBX, phone tap, privacidad, privacy, security, seguridad, Skype, SMS, spy, surveillance, tap, technology, tecnologia, telefonia celular, text message, USA, Windows, Windows Mobile, wireless, wiretap | Leave a comment

Hacker claims to have cracked Skype protocol

A hacker claims to have cracked the Skype’sproprietary encryption protocols that protect the VoIP company’s intellectual property.

The Luxembourg IP telephony company has zealously guarded its protocol but a hacker going by the name of ‘Sean O’Neil’ claims that he’s broken through the protection.

Link

July 12, 2010 Posted by | encryption, security, Skype, technology | Leave a comment

Sigillu Banner

March 19, 2010 Posted by | APAC, Argentina, BlackBerry, Bolivia, Brazil, bugging devices, Canada, Caribbean, cellular phone, Central America, Chile, Colombia, contraespionaje, correo electronico, countersurveillance, criptografia, dispositivos de escucha, eavesdrop, Ecuador, email, EMEA, encryption, escuchas telefonicas, espionage, espionaje, ilegal, illegal, inalambrico, intercepcion, Iphone, Israel, mensajes de texto, Mexico, mobile, Nextel, Nokia, Paraguay, Peru, phone tap, privacidad, privacy, security, seguridad, Skype, spy, surveillance, tap, technology, tecnologia, telefonia celular, text message, Uruguay, USA, Venezuela, Windows, Windows Mobile, wireless, wiretap | Leave a comment

Contact Us

March 14, 2010 Posted by | Argentina, BlackBerry, Brazil, Canada, Central America, Chile, Colombia, encryption, Iphone, Mexico, Nextel, Nokia, Peru, privacy, security, Skype, USA, Venezuela, Windows, Windows Mobile | Leave a comment

Gold Lock Enterprise VS Skype

Skype uses SSL which uses electronic certificates and 128 bit encryption (standard for credit card transactions online also) This level of encryption is NOT appropriate for even top secret level communications. How many times have credit card numbers been stolen online?

http://en.wikipedia.org/wiki/Transport_Layer_Security

128-bit 2^128 2 multiplied by 2 128 times over. = 339,000,000,000,000,000,000,000,000,000,000,000 (give or take a couple trillion…).

Gold Lock Enterprise uses 4 different encryption methods. One of which is 16,384 Bit Authentication. That is 2 multiplied by 2, 16,384 times over (not just 128 times). This method IS appropriate for top secret level communications. Enterprise uses 16,384 Bit Authentication Elliptic Curve 384 Bits (RSA 7680 Bits Equivalent) AES 256 Bits Diffie Hellman 4096 Bits

AES – http://en.wikipedia.org/wiki/Advanced_Encryption_Standard Top Secret appropriate

RSA – http://en.wikipedia.org/wiki/RSA Top Secret appropriate

Diffie Hellman – http://en.wikipedia.org/wiki/Diffie-Hellman_key_exchange Top Secret appropriate

In addition to this technical “stuff” the facts remain that Skype provides a key to governments for lawful interception (which means all the security in the world in now a mute point) and  Skypes 128 bit encryption has been broken, and hackers now easily intercept their calls.

http://sigillu.wordpress.com/category/technologies/skype/

As you can see Enterprise has significantly higher encryption capabilities than Skype. Skype encrypts just enough to satisfy their customers. Gold Lock takes pride in having the best and highest encryption software on the market. Gold Lock Enterprise is a military grade encryption software. No military uses Skype to relay orders or pass top secret information.

October 26, 2009 Posted by | cellular phone, countersurveillance, eavesdrop, encryption, English, escuchas telefonicas, espionage, espionaje, ilegal, Iphone, mobile, Nokia, phone tap, privacy, security, seguridad, Skype, Spanish, spy, tap, USA, Windows Mobile, wireless | , , , , , , , , , , | Leave a comment

Common VoIP Protocols Defeated

Skype

Recent reports have surfaced that have revealed weaknesses in the ever-popular Google Voice and Skype protocols.  These weaknesses have allowed attackers to eavesdrop on third party calls and make unauthorized calls using another person’s account.

Such a vulnerability in a service as popular as this is highly concerning, but the attacks have been proven to work according to many different sources, and also the Slashdot website.  It would seem that we are now looking at two protocols, which remained secure for a long time, which now have a major vulnerability that calls into question the whole security of the architecture.

Any organization that is reliant on Google voice or Skype should now be asking themselves the question: “is it really safe for my company”? Even though according to both companies, the vulnerabilities have been fixes the truth is once a major weakness is exposed it can be very hard to trust it again.

Certainly, the fact that these technologies have been breached must be a concern for both organizations and individuals that are dependent on secure calls.  However, what alternatives are available and how do people utilize them?

One can avoid the dangers of integrating non secure solutions from Skype, Google Voice, or other non secure VOIP systems into organizations infrastructure and instead utilize technologies, which are tested, and proven more secure.

<link>

sigillu.jpg

October 7, 2009 Posted by | encryption, English, privacy, security, Skype, spy, tap, technology | Leave a comment

Skype tapping program code released

skype interception code released

A software developer who designed a way to tap and record calls made on Skype and other VoIP networks has made the source code of the spying program public, a move he said will allow other programmers to build workarounds to the potential threat. The programmer, Ruben Unteregger, was tasked by his former company ERA IT Solutions to write a Trojan horse program that could tap VoIP calls for the Swiss government.

Apparently, the program bypassed Skype’s heralded encryption process, one that has vexed security officials in Europe multiple times.

In a translated interview, Untregger discussed his rationale for releasing the code.

“The code will be published, it will get analyzed as soon as the binaries got uploaded, signature patterns will be created by anti-virus companies, the malware will be detected, blocked and deleted, if it tries to infect a system,” Untregger said.

Untregger’s motives appear to be genuinely in the interest of private citizens and enterprises that use VoIP services like Skype, as the publicizing of the code makes its use by security agencies redundant, according to a Computer World report. However, making this code available could have negative repercussions if hackers can use it to build even more powerful tapping programs. Other instances of Skype hacking, such as China’s purported monitoring of dissident communication via VoIP programs, gives one pause when considering the public availability of such information.

<link>

sigillu.jpg

October 7, 2009 Posted by | eavesdrop, encryption, English, mobile, phone tap, privacy, security, Skype, spy, tap, technology, wiretap | Leave a comment

Source code for Skype eavesdropping trojan in the wild

Earlier this week, Swiss programmer Ruben Unteregger who has been reportedly working for a Swiss company ERA IT Solutions responsible for coding government sponsored spyware, has released thesource code of a trojan horse that injects code into the Skype process in order to convert the incoming and outgoing voice data into an encrypted MP3 available at the disposal of the attacker.

Here’s how the trojan, currently detected as Trojan.Peskyspy, works:

“When the Trojan is executed, it injects a thread into the Skype process and hooks a number of API calls, allowing it to intercept all PCM audio data going between the Skype process and underlying audio devices. Note: Since the Trojan listens to the data coming to and from the audio devices, it gathers the audio independently of any application-specific protocols or encryption applied by Skype when it passes voice data at the network level.

Note: The incoming and outgoing audio data are stored in separate .mp3 files. The Trojan also opens a back door on the compromised computer, allowing an attacker to perform the following actions:
- Send the .mp3 to a predetermined location
- Download an updated version
- Delete the Trojan from the compromised computer”

Skype is often dubbed a “national security threat” by governments all across the globe due to their — at least publicly acknowledged inability — to crack the 256-bit encryption VoIP calls.

And while some of these governments are reportedly spending surreal amounts of tax payer’s money (Rental of the Skype-Capture-Unit per month and instance EUR 3.500) in order to achieve their objectives, others are taking the cost-effectiveness path by attacking the weakest link in the process – the end user infected with a targeted DIY government sponsored spyware recording all ongoing and incoming Skype calls, thereby bypassing the need to attack the encryption algorithm.

<link>

sigillu.jpg

August 31, 2009 Posted by | encryption, English, security, Skype, spy, tap, technology | Leave a comment

Report: Skype Helped China Snoop on Users

In China, nothing is private. As if we needed more proof, a Canadian group has spotted a bank of unsecured servers containing what appear to be filtered-out information from Skype messages that might run afoul of Chinese censors — terms such as “Falun Gong” and “Taiwan independence.”

<link to article>

October 3, 2008 Posted by | eavesdrop, encryption, English, espionage, illegal, privacy, security, Skype, spy, surveillance, tap, technology, text message | Leave a comment

Austrian official fuels Skype backdoor rumours

Off the cuff remarks by Austrian government officials suggest that Skype conversations might be intercepted.

Speaking at a recent meeting on lawful interception between ISPs and Austrian regulators, an unnamed “high-ranking” official at Austria’s interior ministry said that listening into a conversation over Skype presented no particular problems, Heise security reports.

The opinion contrasts with the view of Joerg Ziercke, president of Germany’s Federal Police Office (BKA). At a meeting last November Ziercke said that the inability to decipher the encryption used by Skype in order to intercept VoIP calls had become a problem in counter-terrorism investigations. Weeks after this, leaked documents outlining plans by German firm Digitask to develop software to intercept Skype VoIP communications and SSL transmissions, along with related costing and licensing proposals, surfaced through Wikileaks.

<link to article>

Sigillu Logo

July 25, 2008 Posted by | bugging devices, eavesdrop, English, espionage, phone tap, privacy, security, Skype, spy, surveillance, tap, technology, wiretap | Leave a comment

Follow

Get every new post delivered to your Inbox.