A group of researchers from the Institute of Telecommunications of the Warsaw University of Technology have devised a way to send and receive messages hidden in the data packets used to represent silences during a Skype call.
Wojciech Mazurczyk, Krysztof Szczypiorski and Maciej Karaœ have long been interested in steganography – the science of writing and transmitting secret messages within regular messages.
After learning that Skype transmits voice data in 130-byte packets and the silences in 70-byte packets, they came upon the idea of using the latter to conceal the sending and receiving of additional messages, Trusted Third Party reports (via Google Translate).
In order to do that, they created SkypeHide (or SkyDe), a piece of software that hijacks some of the “silence” packets and then embeds the encrypted messages into them. On the receiving computer, the same software extracts it and decrypts it.
The hidden messages can consist of text, audio or video, and can be transmitted at a rate of almost 1 kilobit per second. And, according to Mazurczyk, the secret data is indistinguishable from silence-period traffic.
More details about the software and how it works will be soon shared with the public, as the researchers are set to present the research at the 1st ACM Workshop on Information Hiding and Multimedia Security which is to be held in Montpellier, France, in June.
Source: Help Net Security
By Ryan Gallagher
New surveillance laws being proposed in countries from the United States to Australia would force makers of online chat software to build in backdoors for wiretapping. For years, the popular video chat service Skype has resisted taking part in online surveillance—but that may have changed. And if it has, Skype’s not telling.
Historically, Skype has been a major barrier to law enforcement agencies. Using strong encryption and complex peer-to-peer network connections, Skype was considered by most to be virtually impossible to intercept. Police forces in Germany complained in 2007 that they couldn’t spy on Skype calls and even hired a company to develop covert Trojans to record suspects’ chats. At around the same time, Skype happily went on record saying that it could not conduct wiretaps because of its “peer-to-peer architecture and encryption techniques”.
Recently, however, hackers alleged that Skype made a change to its architecture this spring that could possibly make it easier to enable “lawful interception” of calls. Skype rejected the charge in a comment issued to the website Extremetech, saying the restructure was an upgrade and had nothing to do with surveillance. But when I repeatedly questioned the company on Wednesday whether it could currently facilitate wiretap requests, a clear answer was not forthcoming. Citing “company policy”, Skype PR man Chaim Haas wouldn’t confirm or deny, telling me only that the chat service “co-operates with law enforcement agencies as much as is legally and technically possible”. Continue reading @ Slate.
Our cars run millions of lines of code that need constant and, often, critical updates. Jim Motavalli writes that Mercedes-Benz’s new mbrace2 ‘cloud infotainment system’ has a secret capability: it can update software automatically and wirelessly. In a process called ‘reflashing,’ the Mercedes system turns on the car operating system (CU), downloads the new application, then cuts itself off. With companies like Fisker paying dearly for constant recalls for software problems, automakers will likely rush to embrace this technology. No more USBs in the dashboard!
The Utah Department of Health has been hacked. 181,604 Medicaid and CHIP recipients have had their personal information stolen. 25,096 had their Social Security numbers compromised. The agency is cooperating with law enforcement in a criminal investigation. The hackers, who are believed to be located in Eastern Europe, breached the server in question on March 30, 2012.
This video is a compilation of Unisys videos directly from their own website, as well as testimony of Ptech whistleblower Indira Singh, along with the father of Enterprise Architecture, John Zachman–who in his own words warned about Ptech’s innate ability to take full control over any and all systems, stating: “You would know where the access points are, you’d know how to get in, you would know where the weaknesses are, you’d know how to destroy it.” This exposes an extremely paramount part of the New World Order agenda (as they are part of the NWO, and are making these admissions). Unisys was directly involved in the 9/11 false flag inside job black operation in order to spearhead and thrust upon the world everything shown in the video. From forced integration of Ptech (“PROMIS II”) RBAC (Role Based Authentication) Enterprise Architectuers that 100% put all command and control (C2) in the hands of the global criminal offshore banking cartel–to using the same artificial intelligence to directly engineer world policy, virtual government, all aspects of military, law enforcement, security, banking, medical, commerce, economies, transportation, personal data, corporate/government data, utility grids (energy, water), food imports/exports, and anything not listed. This is the price humanity pays for not stopping these criminals. It will be absolute hell on Earth enslavement never before achieved by any previous tyranny in history. The only way we can win is for mass awareness to understand that all of these measures of interoperability are sold on totally fraudulent premises, via extremely well crafted propaganda and government Problem-Reaction-Solution fearmongering–that of staged cyber attacks, via deliberately INSECURE systems, and other false flag attacks (called Effects Based Operations (EBO) or Military Operations Other Than War (MOOTW)–where their solutions, for our “safety”, or being “necessary to survive in the economic crisis” (never mind that the same globalists behind Unisys engineered it) are a total forfeiture of liberty, & independence, an anathema to free humanity. We must facilitate, and cultivate incentive to resist all of this insanity and force constitutional government and sovereignty to take precedence, and remove this wickedly engineered evil, i.e. their full spectrum dominance, and put that dominance back to the sovereign individual where the government serves the People, and no shadow government is ever allowed to usurp the unalienable rights of mankind.
This IS Life or Death.
They are not playing games.
You cannot play games either.
Use the distilled knowledge in this video as a weapon of truth to destroy their credibility permanently.
Stop Feeding The Damn Parasites!