Tom Skype is dead. Long live Microsoft surveillance.

There is a special version of Skype for China which monitors user conversations and reports flagged conversations automatically. We wrote an extensive blog post last year on this subject. Since Skype launched its “partnership” with TOM, it has been nearly impossible to download the original (international) version of Skype as skype.com and all related domains are redirected to skype.tom.com, the Chinese partner's website. Microsoft intentionally redirected Chinese users so that they would download a different program, one which looks almost the same as Skype but opens up a user’s communications to surveillance by the Chinese state.

Furthermore, the user experience on the TOM Skype web page is similar to the Skype web page which means that users will unknowingly download TOM Skype and therefore have their conversations and messages monitored and even automatically uploaded to servers in China.

We signed an open letter to Skype, where we asked Microsoft to publicly share what knowledge they have of the surveillance and censorship capabilities that users may be subject to in TOM Skype. Microsoft released its first transparency report after the letter but we believe the data request only included the official Skype client and does not include TOM Skype. After all, sensitive conversations on TOM Skype are automatically uploaded to servers in China and our guess is even Microsoft does not know how many users are affected in this way. Furthermore, in the transparency report, Microsoft did not mention TOM Skype nor the surveillance nature of the product.

On November 7, TOM announced that Microsoft will take over Skype and Microsoft stopped redirecting skype.com to skype.tom.com. As a result, Chinese users can download the original version of Skype. However, existing TOM Skype users are still subject to surveillance without their knowledge. Microsoft has since publicly stated that while their partnership with TOM has ended, they will be announcing details of a new joint venture partnership so that they can continue to “meet obligations under local law”.

Given these changes, we believe the following questions should be addressed directly by Microsoft:

  1. What happens to the text messages, along with millions of records containing personal information stored on Chinese servers now that the partnership with TOM has ended?
  2. Will Microsoft notify all TOM Skype users that their conversations have been monitored and that their chat history with personal information has been uploaded without their knowledge?
  3. Will Microsoft notify all TOM Skype users to suggest that they update their Skype to the original version of Skype immediately, before a new joint venture partnership is launched?
  4. With your new joint venture partner, will Microsoft make another special Chinese version of Skype? Will it have more or less surveillance capacity compared to the TOM version? Compared to the ‘global’ version?
  5. Microsoft has previously noted:  “TOM Online provides access to Skype for Chinese customers, using a modified version that follows Chinese regulations, called TOM Skype”. Microsoft: can you please release the planned surveillance policy for Chinese users so that everybody can know how your company “follows Chinese regulations”? Please also reference the specific “Chinese regulations” that you plan on following.
  6. Skype even has a special Chinese version in the App Store. The standard international version for iOS called “Skype for iPhone” is not available in the China App Store. But a special Chinese version called “Skype” is available only in the China App Store. Chinese iPhone users can only download the special version. Microsoft, when do you plan on making the international version of the app available in the China App Store?

We contacted Skype’s Luxembourg headquarters about this story but had not received a response when this story went to press. As with our previous stories, we would be happy to publish Skype’s response on our web site.

Illustrated History of TOM Skype

Here's how Microsoft worked its deception with TOM Skype for users in China, including those who wanted to download an English language version of Skype. This information originally appeared in our earlier blog post about Skype in China.

Downloading

To download Skype, you'd probably enter skype.com in your browser and look for a download link. If you are in China, however, when you go to skype.com, you used to be automatically redirected to http://skype.tom.com. Skype did not ask if you wanted to be redirected. They also did not inform you of the difference between the regular Skype and the Tom Online version. The websites look very similar. Skype and Microsoft are actively misleading users into thinking that they are using the regular version of Skype. We suspect this deception will continue with the new joint venture partner.

Regular Skype Tom Skype (English) Tom Skype (Chinese)

Installing

The English version of Tom Skype looks exactly the same as the regular version while installing. The Chinese version is based on an earlier version of Skype and looks somewhat different. (Click on any screenshot to see the full version.)

Regular Skype Tom Skype (English) Tom Skype (Chinese)

Logging in

The login screens are very similar, misleading users into thinking that they are using the regular version of Skype.

Regular Skype Tom Skype (English) Tom Skype (Chinese)

About

If you click to the About window in the Skype client, you can find out if you are running the Tom Online version of Skype or not. If you are, then your communications (voice and chat) are passing through Chinese servers and are made available to authorities upon request.

Regular Skype Tom Skype (English) Tom Skype (Chinese)

 

Comments

More Blog Posts

Subscribe to our mailing list
Show content from Blog | Google+ | Twitter | All. Subscribe to our blog using RSS.

Wed, Jul 15, 2015

LinkedIn: technological and financial giants; but morally pygmies

When LinkedIn decided to create a China-hosted version of its website in February, 2014, it made a decision to compromise the company's values in the pursuit of the dollar.

It's important to note that before LinkedIn launched LingYing (the local version of the site), LinkedIn was already active in China. By their own account, they had four million registered users (with little marketing effort), a Chinese-language interface and China-based clients who were buying recruitment ads on the platform (the major source of their revenue). The site had been blocked by the authorities for one 24-hour period but otherwise was always accessible.

So why was it necessary for LinkedIn to create a local entity in China? With a local entity the company would be able to issue official receipts in RMB, making it more convenient for local companies to buy advertising on the site. A local entity also makes it easier to secure marketing deals to promote LingYing in China.

But perhaps the biggest appeal in creating a local entity for LinkedIn is that it would be among the few foreign internet companies who could cosy up with Lu Wei and the Cyberspace Administration of China (CAC). Having that kind of a relationship with CAC surely helps the business and those who are associated with the company.

Sat, Apr 04, 2015

CNNIC censors news about their own statement

On April 1, 2015 Google announced that they will no longer recognize the CNNIC Root and EV (extensive validation) certificate authorities (CAs).

On April 2, 2015 Mozilla concluded that CNNIC’s behaviour in issuing an unconstrained intermediate certificate to another company was ‘egregious practice’ and that Mozilla products would no longer trust any certificate issued by CNNIC’s roots. Mozilla also published a more detailed report about their actions.

After unauthorized digital certificates for several Google domains were exposed by Google and Mozilla on March 23, 2015, CNNIC censored any mention of these posts. CNNIC is not only a certificate authority, they are also China’s online censorship apparatus. CNNIC was, is and will continue to practice internet censorship.

 

News about the April 1 and 2 annoucements has again been censored on social media and also on traditional media in China.

Below is a screenshot of Weibo posts about these announcements.

 

Tue, Mar 31, 2015

Chinese authorities compromise millions in cyberattacks

The Great Firewall has switched from being a passive, inbound filter to being an active and aggressive outbound one. This is a frightening development and the implications of this action extend beyond control of information on the internet. In one quick movement, the authorities have shifted from enforcing strict censorship in China to enforcing Chinese censorship on internet users worldwide.

Fri, Mar 27, 2015

CNNIC censored Google and Mozilla’s posts about CNNIC CA

This week, Google found unauthorized digital certificates for several Google domains, the root CA of which is CNNIC. Google and Mozilla both publicly disclosed this security incident and published blog posts(Google, Mozilla). However, Chinese translations of Google’s and Mozilla's blog posts were censored on the Chinese Internet.

  • William Long is a prominent Chinese blogger on IT and tech. He translated Google’s security post without adding any personal opinions. The Chinese blogpost ranked #1 when searching CNNIC MITM in Chinese on Google and Baidu. He tweeted that he received a phone call from propaganda department demanding the post to be removed immediately. The post http://www.williamlong.info/archives/4183.html was deleted. Google cache is still available.

Wed, Mar 25, 2015

Evidence shows CNNIC and CAC behind MITM attacks

Since 2013, we have repeatedly called on major software vendors to revoke CNNIC-issued certificates. Most notably, we raised this issue when we reported on the Cyberspace Administration of China’s (CAC) man-in-the-middle (MITM) attacks on Google, Microsoft’s Outlook, Apple, Yahoo and Github. Mainstream media have reported about these security vulnerabilities before and on March 24, Ars Technica reported on Google’s announcement that they have definitive evidence that CNNIC (China Internet Network Information Center) was behind a new MITM attack on Google.

From our October, 2014 blog post:

Subscribe to our blog using RSS.

Comments

What do you recommend for private IM & VoIP?

inspired a lot from this post am following this blog regularly and found very good for bookmarking thanks admin
new year sms in hindi 2015
happy new year sms 2015
happy new year 2015 wallpapers
happy new year 2015 quotes
happy new year 2015
happy new year wishes 2015

inspired a lot from this post am following this blog regularly and found very good for bookmarking thanks admin
new year sms in hindi 2015
happy new year sms 2015
happy new year 2015 wallpapers
happy new year 2015 quotes
happy new year 2015
happy new year wishes 2015

this post is awesome, great msg for us, plz update ur blog for daily basis, i am regular visitor of this site, so keep posting for us,

click the below links to create backlink
best free backlink website
click here for msg movie

thanks for this post, keep it up for updating us, i am waiting for ur new article.
IPL 2015 Cricket live score
mpscomputers
Harjinder Singh
thanks again

Add new comment

Filtered HTML

  • Web page addresses and e-mail addresses turn into links automatically.
  • Allowed HTML tags: <a> <em> <strong> <cite> <blockquote> <code> <ul> <ol> <li> <dl> <dt> <dd>
  • Lines and paragraphs break automatically.

Plain text

  • No HTML tags allowed.
  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.
By submitting this form, you accept the Mollom privacy policy.