Appendix B. Skype Security


This appendix provides a somewhat more technical perspective on the security model that Skype uses to maintain privacy. It assumes that you have read Appendix A, which describes the high-level peer-to-peer (P2P) architecture underlying Skype.

This appendix is for people who are interested in the underlying technical aspects of Skype's security model. You do not need to read this appendix to use Skype effectively.

In this appendix, you learn:

  • How Skype's security works

  • How a Skype session is established and users are authenticated

  • How Skype users are authorized

  • How encryption is handled

  • Where Skype data is stored

  • Where to locate more information on Skype security




Skype. The Definitive Guide
Skype: The Definitive Guide
ISBN: 032140940X
EAN: 2147483647
Year: 2004
Pages: 130

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net