We are pleased to announce our release of a major investigate report, Breaching Trust: An analysis of surveillance and security practices on Chinaâ€™s TOM-Skype platform, written by Nart Villeneuve, Psiphon Fellow, the Citizen Lab, at the Munk Centre for International Studies, the University of Toronto.
The full report can be downloaded here:
John Markoff of the New York Times has just released a story about the report, which will appear in tomorrow’s paper, but can be found online here:
Major Findings of this report are as follows:
â€¢ The full text chat messages of TOM-Skype users, along with Skype users who have communicated with TOM-Skype users, are regularly scanned for sensitive keywords, and if present, the resulting data are uploaded and stored on servers in China.
â€¢ These text messages, along with millions of records containing personal information, are stored on insecure publicly-accessible web servers together with the encryption key required to
decrypt the data.
â€¢ The captured messages contain specific keywords relating to sensitive political topics such as Taiwan independence, the Falun Gong, and political opposition to the Communist Party
â€¢ Our analysis suggests that the surveillance is not solely keyword-driven. Many of the captured messages contain words that are too common for extensive logging, suggesting that there may be criteria, such as specific usernames, that determine whether messages are
captured by the system.