Breaching Trust: An analysis of surveillance and security practices on China’s TOM-Skype platform

来源:Citizen Lab
 
We are pleased to announce our release of a major investigate report, Breaching Trust: An analysis of surveillance and security practices on China's TOM-Skype platform, written by Nart Villeneuve, Psiphon Fellow, the Citizen Lab, at the Munk Centre for International Studies, the University of Toronto.

The full report can be downloaded here:
here

John Markoff of the New York Times has just released a story about the report, which will appear in tomorrow's paper, but can be found online here:
here

Major Findings of this report are as follows:

• The full text chat messages of TOM-Skype users, along with Skype users who have communicated with TOM-Skype users, are regularly scanned for sensitive keywords, and if present, the resulting data are uploaded and stored on servers in China.

• These text messages, along with millions of records containing personal information, are stored on insecure publicly-accessible web servers together with the encryption key required to decrypt the data.

• The captured messages contain specific keywords relating to sensitive political topics such as Taiwan independence, the Falun Gong, and political opposition to the Communist Party of China.

• Our analysis suggests that the surveillance is not solely keyword-driven. Many of the captured messages contain words that are too common for extensive logging, suggesting that there may be criteria, such as specific usernames, that determine whether messages are captured by the system.

没有评论: