This appendix provides a somewhat more technical perspective on the security model that Skype uses to maintain privacy. It assumes that you have read Appendix A, which describes the high-level peer-to-peer (P2P) architecture underlying Skype. This appendix is for people who are interested in the underlying technical aspects of Skype's security model. You do not need to read this appendix to use Skype effectively. In this appendix, you learn:
|