Skype Cracked?

25 thoughts on “Skype Cracked?”

  1. there is a lot about this story which one needs to know. i have mailed skype people asking for an explaination. on the issue of FOS- that indeed might be the case. As Alec suggests that they might be smart to open source the skype protocol.

  2. I guess the main issue is to crack the encryption. If you just want to do text chat the rest is simple. They could also have reverse-engineered the codecs, even though it’s way more complex.

    Skype’s seeming dominance is based on a walled garden approach, similar to iTunes/iPod. Hence I don’t see what Skype would gain from disclosing the specification.

  3. Om, I can assure you, this is authentic. I would not steak my reputation on such a nefarious claim if it was not.

    And this is not using any existing Skype code. They designed it from the ground up. I was going to invest in this company when they first started 8 months ago, but somebody beat me to it. A brilliant team.

    I heard from a reporter this morning that Skype is denying it is possible. Boy are they in for a big surprise!

  4. Regarding GIPS codec: Their iSAC codec is prorietary, but iLBS is (not theirs) is open. I suppose Skype allows for codec negotiation and the renegade client can pick iLBC or other standard codecs. Authentic Skype may use GIPS speech engine as well; but that is not required at both the ends.

  5. i believe that charlie should focus on why his company is such a dog … and cant make any headway. Focus on doing something innovative as opposed to just running around blog to blog trying to get your name mentioned…now having said that this is not the first time this claim has been made and remember kazaa was hacked as well with kazaa lite…how much tracation did that get even with spyware built in? not very much. and re the core product will just not be as good most importantly the sound quality because it cant use the best codecs…so if this is true it will be niche … now everyone back to work 🙂

  6. Yes I agree with the post from hiro toro above.
    This is an attempt by Charlie Paglee to get attention for his -seemingly- unsuccessful VoIP startup.
    I hear that he is actually involved in a joint project with these Chinese so is pursuing his own business interests with this post.
    If he would have disclosed that, I would have been a bit more concerened -maybe- for Skype but I think this news will cause some comments in blogs (mine is maybe the last one) and then disappear as quickly from the radar screen as it appeared.

  7. What worries me is if this might break the implicit deal you do with Skype to provide them some of your processor power to help do the routing.

    What if these people come out with a new Skype client that can talk over the network but doesn’t accept the responsibility of doing any of that stuff. Suddenly everyone’s going “hey! Use this. It’s much less heavy on your machine” and the whole network falls apart because no-one is doing that work.

  8. hi. Phil jones brings out an interesting point and if it happens could be potentially a very bad news to skype…on the flip side i use an application called damaka (www.damaka.com) and it works without using any relay server or 3rd party machines to route calls…i beleive that they launched their network operator model before skype in turkey with a company called Mor-Tel (based on the news website of damaka)…

    damaka application could be a potential solution to avoid the issue of hacks as they claim themselves to be truly p2p…

    any comments on damaka?

  9. http://webtown.typepad.com/webtown/2006/07/skypecrackeda.html

    • who funded this research ? who is working behind the screens ? why, how, where ? how long has it been going on ?

    • what is the relation (if any) between http://www.vozin.com / http://www.talqer.com / http://www.hanzen.cn and the alleded group of chinese skype engineers.

    • is there a relation to http://www.coobol.com (site offline but in the cache of google) or not ? And if so why has that not been disclosed.

    • what is the function of the http://www.voipwiki.com/blog. Smoke Screen or Marketing Tricking, creating hype before a launch of this Skype Clone ?

    • why and how long will this information be hidden from the public.

    • what else has been going on behind the smoke-screen ?

    • how lethal (if so) could that be for the original Skype.exe

    • what type of investigations are going and will be going on?

    • what are the consequence of being involved in such activities?

    • how will it affect the business-model and activities of Skype/Ebay?

    • how might this skype clone be marketed and under what domain-name ?

    • when will we see the final proof (under the form of an executable) surface ?

    • is there a relation to the earlier miniskype.exe ?
      This story will certainly have another long tail. I am convinced that the current «no comment» position of Skype shows that this matter is investigated and probably it’s not only Skype that is investigating this matter too. Another thing comes to mind is wether Ebay would have Skype monitoring the Skype-contacts-list,chats, conversations and related. It should not be so difficult to do a content-search and map out of some «who’s talking to who, when and about what» diagram…

This site uses Akismet to reduce spam. Learn how your comment data is processed.