13 points | by walterbell 5 days ago

3 comments

  • krackers 2 hours ago
    >wasn't X, it was Y

    >It’s like...

    The guy is clearly talented and it's a great story, why would you let an LLM tell it for you?

    >And by extracting session keys, they could silently monitor supposedly private communications.

    How could session keys be extracted if it was end to end encrypted? Unless the cryptographic protocol wasn't implemented correctly this shouldn't be possible?

    • vova_hn2 2 hours ago
      Previous sentence says

      > By exploiting vulnerabilities in the signaling layer, they could compromise a target’s client without their knowledge.

      If the client is compromised, anything is possible.

    • SanjayMehta 2 hours ago
      Everyone wants a Booker Prize these days.

      Stopped at "The real guardians of Skype’s secrets lay within, and they were watching my every move."

      What nonsense.

  • bronlund 2 hours ago
    I've seen multiple people declaring the death of Skype, all ignoring the fact that it is not really dead. It has just gotten a new name, a new skin, some new functionality and been embedded as part of an office suite.

    It is not dead, it is more like in a witness protection program.

    • lxgr 2 hours ago
      Don’t forget a completely different architecture (P2P vs. centralized control plane).
  • kleiba 2 hours ago
    Geez, how much space can you spend praising yourself and your own achievements? Gotta work on your prompts, buddy.