An Analysis of the Skype P2P Internet Telephony Protocol

Total Page:16

File Type:pdf, Size:1020Kb

An Analysis of the Skype P2P Internet Telephony Protocol An Analysis of the Skype P2P Internet Telephony Protocol 王永豪 B91902114 杜明可 B91902104 吳治明 B91902110 Outline z Intro z The Skype Network z Key Components z Experiment setup explained z Experiment performed and results z Startup z Login z User search z Call Establishment and teardown z Logout z Media Transfer z Conferencing z Other Skype facts z Conclusion Introduction z Previous solutions are cost saving however falls short on quality. z Call-completion rate are low due to NATs and Firewalls. z Bloated interface makes usage a hassle. Requires technical expertise. The Skype Network (as it used to be) z Central Login Server z Super Nodes z Ordinary Nodes The Skype Network (as it used to be) z NAT and Firewall traversal z STUN and TURN z No global traversal server z Function distributed among nodes z A 3G P2P network z Global Index Technology z Multi-tiered network where supernodes communicate in such a way that every node in the network has full knowledge of all available users and resources with minimal latency z 72 hour guaranteed user find z TCP for signaling z UDP & TCP for media traffic The way it looks now Key Components (as they used to be) z Ports z A Skype Client (SC) opens TCP and UDP listening ports as configured in the client itself z SC also listens on ports 80(HTTP) and 443(HTTPS) z No default listening port z Host Cache (HC) z Skype is an overlay network z Thus the HC contains IP address and port# of super nodes. z Used to reside in the registry Key Components (as they used to be ) z Codecs z iLBC, iSAC, a third codec z Possibly licensed from GlobalIPSound z 50-8,000Hz z Buddy List z Used to be an encrypted registry entry z Switching computers needed reconstruction of the buddy list Key Components (as they used to be ) z Encryption z AES (Advanced Encryption Standard) z 256 bit z NAT and Firewall z SC can traverse NAT and firewalls quite successfully using variations of STUN and TURN z SC cannot prevent from becoming a super node Key Components (what has changed) z Ports z UDP and TCP ports actually used can be very random, sometimes not using the one configured in the SC. z Host Cache z Host Cache is still central to the Skype Protocol z Rather than residing in the Windows’ registry, it has been moved to C:/Documents and Settings/All Users/Application Data/Skype/shared.xml Key Components (What has changed) z Buddy List z No longer resides in the registry z Moved to C:/Document and settings/username/Application Data/skypeaccount/user1024.dbb z Swiching computers no longer needs reconstruction of the entire contact list. z Buddy List are saved both locally and in a remote server. z Last-modified based Key Components (What has changed) z Encryption z Since the size of the encrypted packets have changed since the publication of the paper, we believe that some level of modification has been made to the encryption method. Experimental setup (I) z In the paper z Skype ver. 0.97.06 z Windows 2000 z PII 200MHz 128MB RAM, PPRO 200MHz 128MB RAM z 10/100 Mb/s Ethernet z Our setup z Skype ver. 1.2.0.48 z Windows XP z Pentium M Centrino 1.5GHZ, 512MB RAM z AthlonXP 1800+(1.4Ghz) 1GB RAM z Cable, ADSL Experimenal setup (II) z Network configurations in the paper z Both machines with public IP addresses z One user behind port-restricted NAT z Both users behind port restricted NAT and UDP restricted firewall z Our Network Setup z Both machines with public IP addresses z One user behind NAT z one users behind NAT and UDP restricted firewall z One user behind a nested port-restricted NAT (two NATs) z NAT #1 – D-Link DI-714P+ Wireless Router z NAR #2 Edimax Wireless Broadband Router z Firewall – From the routers Install & Startup z Startup as in the paper z Upon first startup: HTTP GET request to skype.com with the keyword “installed” z Upon subsequent startups: HTTP GET request with keyword “getlatestversion” z Startup Now z Upon first startup: HTTP GET request to ui.skype.com with keyword “installed” z Upon subsequent startups: HTTP GET request with keyword “getlatestversion” Login Login Server(s) z Before: z Skype used to have 1 login server at 80.160.91.11 located in Denmark z Now: z From the numerous tests performed, we believe that Skype now has a “set” of login servers that varies with location. Bootstrap Nodes z Nodes always present in the HC after instalation z 66.235.180.9 z 66.235.181.9 z 80.161.91.25 z 80.160.91.12 z 64.246.49.61 z 64.246.49.60 z 64.246.48.23 z New bootstrap nodes: z 66.235.180.9 z 66.235.181.9 z 195.215.8.145 z 210.58.72.84 z 64.246.49.61 z 64.246.49.60 z 64.246.48.23 First Time Login with public IPs TCP:SYN UDP 18B TCP:ACK UDP 11B TCP 14B UDP 23B TCP 14B UDP 18B TCP 176B TCP 246B FIN FIN,ACK UDP 18B UDP 18B UDP 18B Nodes UDP 26B Nodes TCP:SYN TCP:ACK TCP 14B TCP 28B TCP 34B TCP 197B TCP 146B TCP 16B TCP 67B ICMP UDP 34B 17 Nodes ICMP UDP 44B 5 Nodes ICMP UDP 11B replies from 22 nodes ICMP One user behind a NAT ICMP TCP:SYN ICMP UDP 18B TCP:ACK ICMP UDP 11B TCP 14B ICMP UDP 23B TCP 14B UDP 11B TCP 176B TCP 246B FIN TCP 19B FIN,ACK TCP 1206B UDP 18B TCP 18B UDP 18B TCP 34B UDP 26B TCP 197B Nodes TCP 19B TCP 16B Nodes TCP 1026B TCP:SYN TCP 426B TCP:ACK TCP 10B TCP 2402B TCP 14B TCP 18B TCP 34B UDP 348B Nodes TCP 148B UDP 18B Nodes UDP11B Nodes TCP 61B UDP 26B Nodes UDP 18B UDP 18B Port-restricted NAT and UDP Firewall ICMP ICMP UDP 18B ICMP UDP 44B 18 Nodes ICMP UDP 18B TCP 19B TCP 28B TCP 1205B TCP 16B TCP 407B TCP 197B UDP 18B TCP 52B TCP 16B TCP 101B TCP 93B UDP 18B 4Nodes TCP 249B TCP 197B TCP 1460B TCP 16B TCP 588B TCP 895 TCP:SYN TCP 1460B TCP:ACK TCP 588B TCP 14B TCP 14B TCP 895B TCP 14B TCP 14B TCP 35B TCP 176B TCP 148B TCP 246B TCP 35B FIN FIN,ACK First Time Login (Our tests) TCP:SYN TCP:SYN UDP 18B TCP:ACK TCP:ACK UDP 11B TCP 5B TCP 5B UDP 23B TCP 5B TCP 5B UDP 58B TCP 399B TCP 260B TCP 218B TCP 16B ICMP FIN TCP 56B ICMP FIN,ACK TCP 24B ICMP TCP 21B ICMP TCP 18B TCP 28B TCP 25B UDP 18B TCP 382B UDP 26B TCP 16B UDP 18B FIN UDP 18B FIN, ACK TCP 25B TCP:SYN TCP 437B TCP:ACK TCP 16B TCP:14B TCP 14B TCP 28B TCP 232B UDP 348B 17 Nodes TCP 17B UDP 44B 5 Nodes UDP 11B replies from 22 nodes One user behind a NAT (Our Tests) TCP:SYN ICMP TCP:SYN TCP:ACK UDP 18B ICMP TCP:ACK TCP 5B UDP 11B ICMP TCP 5B TCP 5B UDP 23B ICMP TCP 5B UDP 11B TCP 399B TCP 260B TCP 218B TCP 16B FIN TCP 56B FIN,ACK TCP 24B TCP 19B TCP 21B UDP 18B TCP 1206B TCP 18B UDP 18B TCP 18B TCP 28B TCP 34B TCP 25B UDP 26B TCP 197B Nodes TCP 382B TCP 19B TCP 16B Nodes TCP 16B TCP:SYN TCP 1026B FIN TCP:ACK TCP 426B FIN, ACK TCP 2402B TCP 10B TCP 14B TCP 18B TCP 34B UDP 348B Nodes TCP 148B UDP11B Nodes TCP 61B UDP 18B UDP 18B UDP 26B UDP 18B One user behind NAT and firewall TCP:SYN UDP 18B UDP 18B 4Nodes TCP:ACK TCP 5B TCP 5B TCP:SYN TCP 260B TCP 197B TCP:ACK TCP 16B TCP 16B TCP 5B TCP 56B TCP 5B TCP 24B TCP 399B TCP 21B TCP 218B TCP 18B TCP 28B TCP 14B FIN TCP 25B TCP 14B FIN,ACK TCP 382B TCP 27B TCP 16B TCP 231B FIN TCP 41B FIN, ACK TCP 28B ICMP TCP 16B ICMP TCP 197B ICMP TCP 52B ICMP TCP 16B TCP 101B TCP 93B TCP 249B TCP 1460B TCP 588B TCP 19B TCP 1205B TCP 895 TCP 407B TCP 1460B TCP 588B TCP 895B One user behind nested NAT (Our Tests) TCP:SYN ICMP TCP:SYN TCP:ACK UDP 18B ICMP TCP:ACK TCP 5B UDP 11B ICMP TCP 5B TCP 5B UDP 23B ICMP TCP 5B UDP 11B TCP 399B TCP 260B TCP 218B TCP 16B FIN TCP 56B FIN,ACK TCP 24B TCP 19B TCP 21B UDP 18B TCP 1206B TCP 18B UDP 18B TCP 18B TCP 28B TCP 34B TCP 25B UDP 26B TCP 197B Nodes TCP 382B TCP 19B TCP 16B Nodes TCP 16B TCP:SYN TCP 1026B FIN TCP:ACK TCP 426B FIN, ACK TCP 2402B TCP 10B TCP 14B TCP 18B TCP 34B UDP 348B Nodes TCP 148B UDP11B Nodes TCP 61B UDP 18B UDP 18B UDP 26B UDP 18B NAT, Firewall, Alternate Node Table, Subsequent Login z The information can be detected by z STUN z Receive data from other nodes after connection with SN has been established z Own Analysis z SC initiates all connections, TCP or UDP.
Recommended publications
  • Cisco SCA BB Protocol Reference Guide
    Cisco Service Control Application for Broadband Protocol Reference Guide Protocol Pack #60 August 02, 2018 Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at www.cisco.com/go/offices. THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    [Show full text]
  • Skype Voip Service- Architecture and Comparison Hao Wang Institute of Communication Networks and Computer Engineering University of Stuttgart Mentor: Dr.-Ing
    INFOTECH Seminar Advanced Communication Services (ACS), 2005 Skype VoIP service- architecture and comparison Hao Wang Institute of Communication Networks and Computer Engineering University of Stuttgart Mentor: Dr.-Ing. S. Rupp ABSTRACT Skype is a peer-to-peer (P2P) overlay network for VoIP and other applications, developed by KaZaa in 2003. Skype can traverse NAT and firewall more efficiently than traditional VoIP networks and it offers better voice quality. To find and locate users, Skype uses “supernodes” that are running on peer machines. In contrast, traditional systems use fixed central servers. Also Skype uses encrypted media channel to protect the dada. The main contribution of this article is illustrating the architecture and components of Skype networks and basically analyzing key Skype functions such as login, NAT and firewall traversal. Furthermore, it contains comparisons of Skype networks with VoIP networks regarding different scenarios. On that basis it reveals some reasons why Skype has much better performance than previous VoIP products. Keywords Voice over IP (VoIP), Skype, Peer-to-peer (p2p), Super Node (SN) 1. Introduction It is expected that real-time person-to-person communication, like IP telephony (VoIP), instant messaging, voice, video and data collaboration will be the next big wave of Internet usage. VoIP refers to technology that enables routing of voice conversations over the Internet or any other IP network. Another technology is peer-to-peer, which is used for sharing content like audio, video, data or anything in digital format. Skype is a combination of these two technologies. It has much better performance by making use of advantages of both technologies.
    [Show full text]
  • Devicelock® DLP 8.3 User Manual
    DeviceLock® DLP 8.3 User Manual © 1996-2020 DeviceLock, Inc. All Rights Reserved. Information in this document is subject to change without notice. No part of this document may be reproduced or transmitted in any form or by any means for any purpose other than the purchaser’s personal use without the prior written permission of DeviceLock, Inc. Trademarks DeviceLock and the DeviceLock logo are registered trademarks of DeviceLock, Inc. All other product names, service marks, and trademarks mentioned herein are trademarks of their respective owners. DeviceLock DLP - User Manual Software version: 8.3 Updated: March 2020 Contents About This Manual . .8 Conventions . 8 DeviceLock Overview . .9 General Information . 9 Managed Access Control . 13 DeviceLock Service for Mac . 17 DeviceLock Content Security Server . 18 How Search Server Works . 18 ContentLock and NetworkLock . 20 ContentLock and NetworkLock Licensing . 24 Basic Security Rules . 25 Installing DeviceLock . .26 System Requirements . 26 Deploying DeviceLock Service for Windows . 30 Interactive Installation . 30 Unattended Installation . 35 Installation via Microsoft Systems Management Server . 36 Installation via DeviceLock Management Console . 36 Installation via DeviceLock Enterprise Manager . 37 Installation via Group Policy . 38 Installation via DeviceLock Enterprise Server . 44 Deploying DeviceLock Service for Mac . 45 Interactive Installation . 45 Command Line Utility . 47 Unattended Installation . 48 Installing Management Consoles . 49 Installing DeviceLock Enterprise Server . 52 Installation Steps . 52 Installing and Accessing DeviceLock WebConsole . 65 Prepare for Installation . 65 Install the DeviceLock WebConsole . 66 Access the DeviceLock WebConsole . 67 Installing DeviceLock Content Security Server . 68 Prepare to Install . 68 Start Installation . 70 Perform Configuration and Complete Installation . 71 DeviceLock Consoles and Tools .
    [Show full text]
  • Insight Into the Gtalk Protocol
    1 Insight into the Gtalk Protocol Riyad Alshammari and A. Nur Zincir-Heywood Dalhousie University, Faculty of Computer Science Halifax NS B3H 1W5, Canada (riyad,zincir)@cs.dal.ca Abstract Google talk (Gtalk) is an instant messeger and voice over IP client developed by Google in 2005. Gtalk can work across firewalls and has very good voice quality. It encrypts calls end-to-end, and stores user information in a centralized fashion. This paper analyzes fundamental Gtalk functions such as login, firewall traversal, and call establishment under different network scenarios. The analysis is performed by both active and passive measurement techniques to understand the Gtalk network traffic. Based on our analysis, we devised algorithms for login and call establishment processes as well as data flow models. I. INTRODUCTION Voice over IP (VoIP) is becoming a major communication service for enterprises and individuals since the cost of VoIP calls is low and the voice quality is getting better. To date, there are many VoIP products that are able to provide high call quality such as Skype [1], Google Talk (Gtalk) [2], Microsoft Messenger (MSN) [3], and Yahoo! Messenger (YMSG) [4]. However, few information has been documented about protocol design used by these VoIP clients since the protocols are not standardized, many of them are proprietary, and the creators of these softwares want to keep their information confidential and protect their protocol design form competitors. In this paper, we have generated and captured network traffic in order to determine the broad characteristics of one of the most recent and fast growing VoIP applications, Google Talk.
    [Show full text]
  • Sailpoint Direct Connectors Administration and Configuration Guide for Version 7.3
    SailPoint Direct Connectors Version 7.3 Administration and Configuration Guide Copyright © 2018 SailPoint Technologies, Inc., All Rights Reserved. SailPoint Technologies, Inc. makes no warranty of any kind with regard to this manual, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. SailPoint Technologies shall not be liable for errors contained herein or direct, indirect, special, incidental or consequential damages in connection with the furnishing, performance, or use of this material. Restricted Rights Legend. All rights are reserved. No part of this document may be published, distributed, reproduced, publicly displayed, used to create derivative works, or translated to another language, without the prior written consent of SailPoint Technologies. The information contained in this document is subject to change without notice. Use, duplication or disclosure by the U.S. Government is subject to restrictions as set forth in subparagraph (c) (1) (ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013 for DOD agencies, and subparagraphs (c) (1) and (c) (2) of the Commercial Computer Software Restricted Rights clause at FAR 52.227-19 for other agencies. Regulatory/Export Compliance. The export and re-export of this software is controlled for export purposes by the U.S. Government. By accepting this software and/or documentation, licensee agrees to comply with all U.S. and foreign export laws and regulations as they relate to software and related documentation. Licensee will not export or re-export outside the United States software or documentation, whether directly or indirectly, to any Prohibited Party and will not cause, approve or otherwise intentionally facilitate others in so doing.
    [Show full text]
  • Skypemorph: Protocol Obfuscation for Tor Bridges
    SkypeMorph: Protocol Obfuscation for Tor Bridges Hooman Mohajeri Moghaddam Baiyu Li Mohammad Derakhshani Ian Goldberg Cheriton School of Computer Science University of Waterloo Waterloo, ON, Canada {hmohajer,b5li,mderakhs,iang}@cs.uwaterloo.ca ABSTRACT The Tor network is designed to provide users with low- latency anonymous communications. Tor clients build cir- cuits with publicly listed relays to anonymously reach their destinations. However, since the relays are publicly listed, they can be easily blocked by censoring adversaries. Con- sequently, the Tor project envisioned the possibility of un- listed entry points to the Tor network, commonly known as bridges. We address the issue of preventing censors from detecting the bridges by observing the communications be- tween them and nodes in their network. We propose a model in which the client obfuscates its mes- sages to the bridge in a widely used protocol over the Inter- net. We investigate using Skype video calls as our target protocol and our goal is to make it difficult for the censor- Figure 1: This graph from metrics.torproject.org shows the ing adversary to distinguish between the obfuscated bridge number of users directly connecting to the Tor network from connections and actual Skype calls using statistical compar- China, from mid-2009 to the present. It shows that, after isons. 2010, the Tor network has been almost completely blocked We have implemented our model as a proof-of-concept from clients in China who do not use bridges. [41] pluggable transport for Tor, which is available under an open-source licence. Using this implementation we observed the obfuscated bridge communications and compared it with attempts to block access to Tor by regional and state-level those of Skype calls and presented the results.
    [Show full text]
  • Os Protocolos De Todo Dia
    Estudo de Caso Os protocolos de todo dia Prof. Daniel Fernando Pigatto Qual é a arquitetura de aplicação do WhatsApp? ❏ Cliente-servidor ❏ Ponto-a-ponto ❏ Híbrida Qual é a arquitetura de aplicação do WhatsApp? ❏ Cliente-servidor ❏ Ponto-a-ponto ❏ Híbrida WhatsApp ➔ Arquitetura de aplicação: Modelo cliente-servidor ➔ Protocolo de aplicação: XMPP (Extensible Messaging and Presence Protocol), que é baseado em XML e era antigamente conhecido como Jabber ➔ Protocolo de transporte: TCP ➔ Segurança: fim a fim com Signal Protocol Qual é a arquitetura de aplicação do Skype? ❏ Cliente-servidor ❏ Ponto-a-ponto ❏ Híbrida Qual é a arquitetura de aplicação do Skype? ❏ Cliente-servidor (2018) ❏ Ponto-a-ponto (até o início de 2018) ❏ Híbrida Skype ➔ Arquitetura de aplicação: Modelo cliente-servidor ◆ Até o início de 2018 era P2P (fonte) ➔ Protocolo de aplicação: Skype Protocol (proprietário) ➔ Protocolo de transporte: TCP e UDP (para voz) ➔ Segurança: RC4 para sinalização e AES para dados de voz (fonte) Qual é a arquitetura de aplicação do Youtube? ❏ Cliente-servidor ❏ Ponto-a-ponto ❏ Híbrida Qual é a arquitetura de aplicação do Youtube? ❏ Cliente-servidor ❏ Ponto-a-ponto ❏ Híbrida Youtube ➔ Arquitetura de aplicação: Modelo cliente-servidor ◆ Funciona de maneira similar à Netflix ➔ Protocolo de aplicação: o site usa HTTP e a transmissão de vídeo RTSP (Real Time Streaming Protocol) ➔ Protocolo de transporte: TCP (fonte) ◆ Pelas mesmas razões que a Netflix ➔ Segurança: HTTPS (fonte) Qual é a arquitetura de aplicação do BitTorrent? ❏ Cliente-servidor ❏ Ponto-a-ponto
    [Show full text]
  • Computer Networks VOIP
    Computer Networks VOIP Preshetha Kanagaiah VoIP ● Voice over Internet Protocol, aka Internet telephony is a technology that allows a user to use the internet as a medium of transmission of voice communication to make and receive phone calls instead of using the traditional PSTN (public switched telephone network lines). ● Converts the voice from an analog signal to a digital signal over the internet using codecs, digital information is packetized, transmission occurs as IP packets. ● Communication platforms that use VoIP: ○ Skype, Vonage, Viber, Google Hangouts, Whatsapp (end-to-end encryption) Traditional PSTN vs. VoIP PSTN (POTS): Network: - Circuit switching - Packet switching - Dedicated path b/w sender & receiver - No dedicated path b/w sender & receiver - Reserved bandwidth in advance - Bandwidth is adjusted based on necessity - Cost based on distance and time - Cost is NOT based on distance and time - Very Costly for additional features such as - Additional features are covered under the VM, Caller ID, call waiting, call forwarding, service (VM, CID, call waiting, forwarding, conferencing, additional lines conferencing) - Better voice quality - Transmit data, video, and voice - Local and international communication - can be converged with PSTN VoIP Signaling Protocols ❏ SIP (Session Initiation Protocol) : ❏ open standard, application layer protocol ❏ Similar to HTTP- adopts client/server architecture ❏ Based on text-based messages for requests/responses ❏ INVITE request, ACK, BYE terminates connection, (others include: CANCEL, OPTIONS,
    [Show full text]
  • The Digital Security of Journalists in Distress | Report 3| ______
    Journalists in Distress: Assessing the Digital Viability of a Global Emergency Assistance Network The Digital Security of Journalists in Distress | Report 3| _________________________________________________ Table of contents Executive Summary 01 Author’s Information 01 Special Thanks 02 Figures 03 Part 1: The Digital Practices of Journalists in Distress 1.1 Accessing the Internet 04 1.2 Using cyber devices 06 1.3 Going to Internet cafés 09 1.4 Orienting to digital security 12 1.5 Communicating with emergency assistance organizations 16 Part 2: The Digital Vulnerabilities of Journalists in Distress 2.1 Modes of communication 20 2.2 Using cyber devices 22 2.3 Pitfalls of public access points 24 2.4 Orienting to digital security 25 2.5 Basic security enhancements 27 Part 3: Conclusions 29 Appendix 1 31 Survey methodology Appendix 2 32 Survey questionnaire P a g e | 1 Executive Summary This report assesses the digital practices and vulnerabilities of at-risk journalists who have applied to the Journalists in Distress (JID) program at Canadian Journalists for Free Expression (CJFE) for assistance. CJFE’s JID program is a member of a broader, global network of human rights organizations which operate similar emergency assistance programs that provide humanitarian assistance to journalists and other media workers around the world who are persecuted because of their work. The applicants to these programs are typically individuals who are experiencing trauma and other types of precarious, dangerous situations. They have been targeted by more powerful and well-connected State and non-State actors for intimidation, harassment, physical threats and assaults, arrest and detainment, and even disappearance or murder.
    [Show full text]
  • Techno-Social Platform for Sustainable Models and Value Generation in Commons-Based Peer Production in the Future Internet
    P2Pvalue Deliverable 1.2 P2Pvalue – Techno-social platform for sustainable models and value generation in commons-based peer production in the Future Internet Programme: FP7-ICT-2013-10 Project: 610961 Start date: 2013-10-01 Duration: 36 months Deliverable D1.2 [Theoretical synthesis: Final theoretical synthesis of WP1, including research reports on data collection] Submission date: 2014-07-31 Organisation name of lead contractor for this deliverable: Universitat Autònoma de Barcelona I P2Pvalue Deliverable 1.2 Dissemination Status PU Public x PP Restricted to other programme participants (including the Commission Services) RE Restricted to a group specified by the consortium (including the Commission Services) CO Confidential, only for members of the consortium (including the Commission Services) ii P2Pvalue Deliverable 1.2 Document information 1.1 Author(s) -(in alphabetic order and by partners) Author Organisation E-mail Primavera De Filippi CNRS [email protected] Melanie Dulong de CNRS [email protected] Rosnay Francesca Musiani CNRS [email protected] Ignasi Capdevila P2PF [email protected] Marco Berlinguer Universitat [email protected] Autonoma de Barcelona (IGOP) Mayo Fuster Morell Universitat [email protected] (Deliverable and WP Autonoma de coordinator) Barcelona (IGOP) Jorge L Salcedo Universitat [email protected] Autonoma de Barcelona (IGOP) Wouter Tebbens Universitat [email protected] Autonoma de Barcelona (IGOP) Adam Arvidsson UMIL [email protected] Alessandro UMIL [email protected]
    [Show full text]
  • Study on Differences Between Microsoft Skype for Business and Microsoft Skype Broadcast 1Siddarth Kaul, 2Dr Anuj Jain 1,2Bhagwant University Rajasthan India
    IJCST VOL . 9, Iss UE 2, APR I L - JUNE 2018 ISSN : 0976-8491 (Online) | ISSN : 2229-4333 (Print) Study on Differences between Microsoft Skype for Business and Microsoft Skype Broadcast 1Siddarth Kaul, 2Dr Anuj Jain 1,2Bhagwant University Rajasthan India Abstract Broadcast Online is the Meetings can be setup anywhere across The paper proposes to clearly elaborate the differences and the Globe with simple and relatively easy licensing available by understanding of Microsoft Skype for business and Microsoft Microsoft under Different Plan categories with Live Broadcast Skype Broadcast as known Skype for Business is a Unified participants Ratio up to 10,000 participants. communication Platform (Formerly Known as Lync) for audio & Video Conferencing, IM and Image and File Transfer capabilities IV. Difference between Skype for Business and Skype which is a successful platform in the Market whereas Skype Meeting Broadcast Broadcast is a portal for Online schedule of Meeting Broadcast Skype for Business only provides the ability up to 250 participants and audio & Video Conferencing on Microsoft Portal. to collaborate Online by using Different features such as IM,Content sharing, Video, audio the meetings can be easily setup by the Keywords Outlook Office 365 Skype Client or by OWA. Skype, Unified Communication, Video Conferencing Skype Meeting Broadcast is a feature for Skype for Business Online and Office 365 which helps to schedule, produce and I. Introduction Broadcast LIVE meetings for up to 10,000 Participants. The Unified Communication has the potential to dramatically meetings can be scheduled from the skype online broadcast portal change and improve the Enterprise Communication or Business before scheduling any meeting the Licensing must be enabled for Communication in real world by reducing the overall enterprise the organization.
    [Show full text]
  • Skype for Business Protocol Poster Outline
    Skype For Business Protocol Poster andRory homogeneous remains hydrochloric when decamps after Rudolfo some outfoxes pen-friend thinly very or disposedly nest any raffles. and unconstitutionally? Is Bertie always succinct Harlan commutatively,reselling his downbeat pneumatic suberises and stately. scherzando or irrespectively after Matthaeus hinged and cose Earliest time around and skype poster to apply the latest and a game. See more video with skype business protocol poster describes what actually this a new services are common to record calls with live video downloader for client. Publishing environment described later and advice for the absense of service. Moment you want to hear your friends and overloading the answers. Primary target of you want to suspend active directory updates are you a download: from the walls. Dual wield with it for protocol used to anyone else would you run it only takes your vision with unpacking a click the same for more! Screen to our skype to configure the new versus battle mode can be about online and refunded. Canon color to just for business server stencils i post the comment is not affect the deployment scenario it gives you like your router and apps, a social site. Dark circles beneath your location, malicious email address unique battle terrible things microsoft secure a skype. Dashing and sign using webcams, giving you can make and macs. Projects and skype protocol for business client runtime that. Policy settings can use here, from there other international sites to you do not the process. Park application sharing or skype business protocol poster to those in my mind you can follow the network and skype for incoming sip listening requests.
    [Show full text]