Jump to content

skype activity blocked


Recommended Posts

  • Root Admin

Why are these ip addresses were being accessed.

Blocking suspect ips by MalwareBytes does not cause any noticeable degradation of Skype's performance.

 

 

The following information is from Skype Support

 

"We understand the inconvenience that might cause and we appreciate your patience and understanding. Skype is a peer-to-peer (P2P) application. Peer-to-peer makes it possible for multiple computers running the same P2P software to communicate and participate in traffic routing, processing and other bandwidth intensive tasks that are usually performed by a central server. P2P allows sharing files containing audio, video, data and real-time data.

Skype has no single “critical node” that it relies on to operate which makes it incredibly reliable. Skype consists of three types of peer nodes: ordinary nodes, supernodes and relay nodes. Ordinary nodes run the Skype client. They’re the most common, and are what users normally see when they install and use Skype. Supernodes are peer nodes that also perform functions such as assisting with searching for the location of other nodes. These supernodes are not dedicated and come and go. They are not servers; supernodes are regular user computers that run the Skype client, but also temporarily perform other functions. Only a very small percentage of Skype users (if any) become supernodes, mainly because the majority of users have no public IP address. Relay nodes relay media and signalling information between nodes that otherwise can’t reach each other, normally because of firewall permissions or problems traversing NAT (network address translation). Relay nodes aren’t party to the communication content and can’t view or decipher it.

We’re committed to secure communications and protecting our users’ privacy. We follow the latest best practice in security, including:

- Encryption of data end-to-end with 256-bit AES encryption keys.

- Protection of encryption keys which aren’t revealed to users or escrowed to third parties and are discarded when the session ends.

- Use of credential-based identities and end-to-end encryption to make 'man-in-the-middle' attacks very unlikely.

- Our security model also prevents anyone with a supernode or relay node from interfering with, or capturing any part of, a Skype communication, even if they can collect or sniff network data packets. It also makes it very difficult for anybody to eavesdrop on content by installing an internet computer in the theoretical path of Skype traffic.

No one can guarantee complete anonymity or secrecy. However, our transport layer encryption uses the Advanced Encryption Standard (AES) algorithm. This makes it very unlikely that your Skype communications will be intercepted or decrypted over the P2P network. We use both public and private keys to secure all signals over the P2P network, as well as communications content. Our cryptographic model uses public-key and symmetric-key cryptography, including the AES algorithm in 256-bit integer counter-mode. We also use the 1024-bit RSA algorithm to negotiate symmetric AES keys. User’s public keys are certified at login using 1536 or 2048-bit RSA certificates. "

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.