skypeopensource | 9 years ago | on: Skype-open-source: Call to donate
skypeopensource's comments
skypeopensource | 9 years ago | on: Skypeopensource2 – Skype client based on reversing Skype 5.5
skypeopensource | 9 years ago | on: Skypeopensource2 – Skype client based on reversing Skype 5.5
skypeopensource | 9 years ago | on: Skypeopensource2 – Skype client based on reversing Skype 5.5
Yes, its still up here: https://skype-open-source2.blogspot.com/
skypeopensource | 9 years ago | on: Skypeopensource2 – Skype client based on reversing Skype 5.5
Here was a little insight:
https://nakedsecurity.sophos.com/2011/06/03/skype-protocol-c...
skypeopensource | 9 years ago | on: Skypeopensource2 – Skype client based on reversing Skype 5.5
I mean, EU have a much more great priority then Skype TOS.
If someone will add to Skype TOS "and please dont breath or dont go to toilets during use of our application". It will have zero effects in legal meaning. Because it break upfront law and United Nations based rights and etc.
tldr;
They just try to fear you with "dont do this" thing.
skypeopensource | 9 years ago | on: Skypeopensource2 – Skype client based on reversing Skype 5.5
skypeopensource | 9 years ago | on: Skype protocol dumps
skypeopensource | 9 years ago | on: Skype protocol dumps
Also, you have good working proto. Do changes to it daily... For that reason? Just because someone write compatible client (very buggy, by the way, and less of features)? I dont think so.
skypeopensource | 9 years ago | on: Skype protocol dumps
skypeopensource | 9 years ago | on: Skype protocol dumps
this is some thougts and result of my investigation into skype protocol and how it is worked.
First of all, what we need to reconstruct network protocol?
We need plain text data which transfered from host A to host B, right? Right. So, there it is. There is a text files with plain text data which sended from one skype client to another skype client. Yes, it have much crypto on lower levels. For now, just dont think about it. It was researched one time and after we just encapsulate it in function or class and dont care about it. Text files of skype send message sequence:
http://dev.epycslib.ru/dumps/parse_proto.zip
Okay, we got plain text data transfered. What we need next? We need understand, that all this data means. Where is destination username, where is time and where is message. And how protocol care it all for working good. How to do this? Best way, its rewrite it on paper in your own blocks and visual representation to understand internal structure of protocol. Make visual blocks and etc. Like in UML. So, there it is. My scans of hand written paper with skype protocol send message sequences:
http://dev.epycslib.ru/dumps/skypeproto.zip
More info at:
http://skype-open-source2.blogspot.ru/2016/06/skype-protocol...
skypeopensource | 10 years ago | on: Skype-open-source2: Call to donate
skypeopensource | 10 years ago | on: Skype-open-source2: Call to donate
skypeopensource | 10 years ago | on: Skype-open-source2: Call to donate
skypeopensource | 10 years ago | on: Skype-open-source2: Call to donate
Paypal:
50 USD
10 USD
4 GBP
10 USD
skypeopensource | 10 years ago | on: Skype-open-source2: Call to donate
skypeopensource | 10 years ago | on: Skype-open-source2: Call to donate
skypeopensource | 10 years ago | on: Skype-open-source2: Call to donate
[email protected] http://vk.com/efim.bushmanov https://www.facebook.com/efim.bushmanov
skypeopensource | 10 years ago | on: Skype-open-source2: Call to donate
skypeopensource | 10 years ago | on: Skype-open-source2: Call to donate
I am not. Problem was in different case. I should not post patched skype binaries, needed for reverse engineering. And its okay, what i will be shotdown for use it.