- Great Painters
- Accounting
- Fundamentals of Law
- Marketing
- Shorthand
- Concept Cars
- Videogames
- The World of Sports

- Blogs
- Free Software
- Google
- My Computer

- PHP Language and Applications
- Wikipedia
- Windows Vista

- Education
- Masterpieces of English Literature
- American English

- English Dictionaries
- The English Language

- Medical Emergencies
- The Theory of Memory
- The Beatles
- Dances
- Microphones
- Musical Notation
- Music Instruments
- Batteries
- Nanotechnology
- Cosmetics
- Diets
- Vegetarianism and Veganism
- Christmas Traditions
- Animals

- Fruits And Vegetables


  1. Adobe Reader
  2. Adware
  3. Altavista
  4. AOL
  5. Apple Macintosh
  6. Application software
  7. Arrow key
  8. Artificial Intelligence
  9. ASCII
  10. Assembly language
  11. Automatic translation
  12. Avatar
  13. Babylon
  14. Bandwidth
  15. Bit
  16. BitTorrent
  17. Black hat
  18. Blog
  19. Bluetooth
  20. Bulletin board system
  21. Byte
  22. Cache memory
  23. Celeron
  24. Central processing unit
  25. Chat room
  26. Client
  27. Command line interface
  28. Compiler
  29. Computer
  30. Computer bus
  31. Computer card
  32. Computer display
  33. Computer file
  34. Computer games
  35. Computer graphics
  36. Computer hardware
  37. Computer keyboard
  38. Computer networking
  39. Computer printer
  40. Computer program
  41. Computer programmer
  42. Computer science
  43. Computer security
  44. Computer software
  45. Computer storage
  46. Computer system
  47. Computer terminal
  48. Computer virus
  49. Computing
  50. Conference call
  51. Context menu
  52. Creative commons
  53. Creative Commons License
  54. Creative Technology
  55. Cursor
  56. Data
  57. Database
  58. Data storage device
  59. Debuggers
  60. Demo
  61. Desktop computer
  62. Digital divide
  63. Discussion groups
  64. DNS server
  65. Domain name
  66. DOS
  67. Download
  68. Download manager
  69. DVD-ROM
  70. DVD-RW
  71. E-mail
  72. E-mail spam
  73. File Transfer Protocol
  74. Firewall
  75. Firmware
  76. Flash memory
  77. Floppy disk drive
  78. GNU
  79. GNU General Public License
  80. GNU Project
  81. Google
  82. Google AdWords
  83. Google bomb
  84. Graphics
  85. Graphics card
  86. Hacker
  87. Hacker culture
  88. Hard disk
  89. High-level programming language
  90. Home computer
  91. HTML
  92. Hyperlink
  93. IBM
  94. Image processing
  95. Image scanner
  96. Instant messaging
  97. Instruction
  98. Intel
  99. Intel Core 2
  100. Interface
  101. Internet
  102. Internet bot
  103. Internet Explorer
  104. Internet protocols
  105. Internet service provider
  106. Interoperability
  107. IP addresses
  108. IPod
  109. Joystick
  110. JPEG
  111. Keyword
  112. Laptop computer
  113. Linux
  114. Linux kernel
  115. Liquid crystal display
  116. List of file formats
  117. List of Google products
  118. Local area network
  119. Logitech
  120. Machine language
  121. Mac OS X
  122. Macromedia Flash
  123. Mainframe computer
  124. Malware
  125. Media center
  126. Media player
  127. Megabyte
  128. Microsoft
  129. Microsoft Windows
  130. Microsoft Word
  131. Mirror site
  132. Modem
  133. Motherboard
  134. Mouse
  135. Mouse pad
  136. Mozilla Firefox
  137. Mp3
  138. MPEG
  139. MPEG-4
  140. Multimedia
  141. Musical Instrument Digital Interface
  142. Netscape
  143. Network card
  144. News ticker
  145. Office suite
  146. Online auction
  147. Online chat
  148. Open Directory Project
  149. Open source
  150. Open source software
  151. Opera
  152. Operating system
  153. Optical character recognition
  154. Optical disc
  155. output
  156. PageRank
  157. Password
  158. Pay-per-click
  159. PC speaker
  160. Peer-to-peer
  161. Pentium
  162. Peripheral
  163. Personal computer
  164. Personal digital assistant
  165. Phishing
  166. Pirated software
  167. Podcasting
  168. Pointing device
  169. POP3
  170. Programming language
  171. QuickTime
  172. Random access memory
  173. Routers
  174. Safari
  175. Scalability
  176. Scrollbar
  177. Scrolling
  178. Scroll wheel
  179. Search engine
  180. Security cracking
  181. Server
  182. Simple Mail Transfer Protocol
  183. Skype
  184. Social software
  185. Software bug
  186. Software cracker
  187. Software library
  188. Software utility
  189. Solaris Operating Environment
  190. Sound Blaster
  191. Soundcard
  192. Spam
  193. Spamdexing
  194. Spam in blogs
  195. Speech recognition
  196. Spoofing attack
  197. Spreadsheet
  198. Spyware
  199. Streaming media
  200. Supercomputer
  201. Tablet computer
  202. Telecommunications
  203. Text messaging
  204. Trackball
  205. Trojan horse
  206. TV card
  207. Unicode
  208. Uniform Resource Identifier
  209. Unix
  210. URL redirection
  211. USB flash drive
  212. USB port
  213. User interface
  214. Vlog
  215. Voice over IP
  216. Warez
  217. Wearable computer
  218. Web application
  219. Web banner
  220. Web browser
  221. Web crawler
  222. Web directories
  223. Web indexing
  224. Webmail
  225. Web page
  226. Website
  227. Wiki
  228. Wikipedia
  229. WIMP
  230. Windows CE
  231. Windows key
  232. Windows Media Player
  233. Windows Vista
  234. Word processor
  235. World Wide Web
  236. Worm
  237. XML
  238. X Window System
  239. Yahoo
  240. Zombie computer

This article is from:

All text is available under the terms of the GNU Free Documentation License: 


From Wikipedia, the free encyclopedia


Skype (IPA pronunciation: /skʌɪp/, rhymes with type) is a peer-to-peer Voice over IP (VoIP) network founded by the entrepreneurs Niklas Zennström and Janus Friis, also founders of the file sharing application Kazaa. It competes against existing open VoIP protocols such as SIP, IAX, and H.323. The Skype Group, acquired by eBay in October 2005, is headquartered in Luxembourg, with offices in London, Tallinn and Prague[1].

Skype has experienced rapid growth in both popular usage and software development since launch, both of its free and its paid services. The Skype communications system is notable for its broad range of features, including free voice and video conferencing, and its ability to use peer to peer (decentralized) technology to overcome common firewall and NAT (Network address translation) problems.

System and software


The caller ID information is masked when a SkypeOut call is placed.
The caller ID information is masked when a SkypeOut call is placed.

The main difference between Skype and other VoIP clients is that Skype operates on a peer-to-peer model, rather than the more traditional server-client model. The Skype user directory is entirely decentralised and distributed among the nodes in the network, which means the network can scale very easily to large sizes (currently just over 100 million users) without a complex and costly centralised infrastructure.

Skype also routes calls through other Skype peers on the network to ease the traversal of Symmetric NATs and firewalls. This, however, puts an extra burden on those who connect to the Internet without NAT, as their computers and network bandwidth may be used to route the calls of other users.

The Skype client's application programming interface (API) opens the network to software developers. The Skype API allows other programs to use the Skype network to get "white pages" information and manage calls.

The Skype code is closed source, and the protocol is not standardized. The Windows user interface was developed in Pascal using Delphi, the Linux version is written in C++ with Qt, and the Mac OS X version is written in Objective-C with Cocoa.[2] Parts of the client use Internet Direct (Indy), an open source socket communication library.


Critics point out that secure communication is not a feature:

  • Skype reportedly uses openly available, strong encryption algorithms.[3]
  • The user is not involved in the encryption process and therefore does not have to deal with the issues of Public key infrastructure.


The Skype code is proprietary and closed source, and will not become Open-source software, according to a quotation:

..we don't have the time right now."

—Niklas Zennstrom, co-founder of Skype, responding to the Skype security model[4]

The book from Que Publishing, Skype: The Definitive Guide[5] points out partly:

  • Skype can utilise other users' bandwidth. (Although this is allowed for in the EULA, there is no way to tell how much bandwidth is being used in this manner). There are some 20,000 supernodes out of many millions of users logged on. Skype Guide for network administrators [3] claims that supernodes carry only control traffic up to 5 kbytes/s and relays may carry other user data traffic up to 10 kbytes/s (for one video call). A relay should not normally handle more than one "relayed connection".
  • Skype's file-transfer function does not contain any programmatic interfaces to antivirus products, although Skype claims to have tested its product against antivirus "Shield" products.
  • The lack of clarity as to content means that firewalls and systems administrators cannot be sure what Skype is doing. (The combination of an invited and a reverse-engineered study taken together suggest Skype is not doing anything hostile.) Firewall rules for Ip tables were given to block Skype for corporates.
  • The actual communication of any given Skype conversation is reported to appear relatively secure; both cryptographic analyses concluded that Skype had made good use of modern encryption techniques and had coded the actual encryption algorithms correctly within the software.

Resource usage

A typical early version of Skype 3.0 Beta, running on a Windows XP desktop
A typical early version of Skype 3.0 Beta, running on a Windows XP desktop

Skype accesses the hard disk several times per minute. This can be verified by observing the HDD's activity LED, or by using a file access monitor such as FileMon.[6] With regard to internet bandwidth, certain users are selected by software to act as "supernodes". Under certain conditions, Skype is reportedly willing to accept thousands of connections, but is stated to limit itself to 40Kb/s upload and download.[7][8][9]

Confidentiality of data

Skype claims that the proprietary session establishment protocol is efficient and prevents both man-in-the-middle and replay attacks. The software is not self-certifying which means it needs to connect and login to a centralized Skype server to certify each user's public key.

Skype currently permits multiple concurrent logins: if an attacker is able to obtain a user's login password, the attacker could login as that user, and change their status to "Hidden". Thereafter, any chat sessions involving the real user are possibly copied to the hacker's "ghost" account. Provided a user keeps his/her password secure, this is not of concern.

Authenticity of user identity

Skype provides an uncontrolled registration system for users: registration requires no proof (in means of state-issued ID card) of the identity of the user. This works two ways: you can use the system safely without revealing your real-life identity to other users of the system, but on the other hand you have no guarantees that the person you communicate with is the one they say they are in real life. The downside of this is that it is easy to use the personal name (but not identity) of a trusted person as a Skype nickname and trick a naive user into revealing information or executing a program sent to them.

It should be noted that this behavior is common to all digitally provided services: the exception is certificates from trusted certificate authorities with all the known drawbacks

Major Events

For detailed changelog see Skype changelog.

Versions now exist for Microsoft Windows (2000, XP and CE (Pocket PC)), Mac OS X and GNU/Linux. The Linux version runs on FreeBSD through its Linux binary compatibility; the Fedora Core version works fine, provided the user switches on the microphone in the GNOME sound settings. Symbian version is currently under development. [15]

Usage and Traffic

It was reported that eight million concurrent Skype users were online as of November 8, 2006.[16] Gender information is inconclusive so far. More than half of all users declined to state their sex.

Although the volume of international traffic routed via Skype is significant, the quantity is still small when compared to a global switched and VoIP traffic base of 264 billion minutes. Computer-to-computer traffic between Skype users in 2005 was equivalent to 2.9% of international carrier traffic in 2005 and approximately 4.4% of total international traffic in 2006[17].

Skype incorporates some features which obfuscate its traffic, but it is not specifically designed to thwart traffic analysis and therefore does not provide anonymous communication. Some researchers have also been able to watermark the traffic so that it is identifiable even after passing it through an anonymizing network [4].



SkypeOut rates as of May 2006, in USD$ per minute
SkypeOut rates as of May 2006, in USD$ per minute

SkypeOut allows Skype users to call traditional telephone numbers, including mobile telephones, for a fee. This fee is as low as USD$0.024 per minute for most developed countries, and as high as USD$2.142 per minute for calls to the dependency of Diego Garcia. After 180 days of not making a SkypeOut call the Skype balance expires. This policy makes Skypeout a poor service for infrequent users as they will often lose their entire account balance.

Until December 31 2006, SkypeOut calls originated within the USA and Canada to destinations within USA and Canada are free of charge. The standard SkypeOut rate will be charged starting in 2007 [18], although an unlimited usage plan for North American calls is available. [19]

SkypeOut calls to toll free numbers in France (+33 800, +33 805, +33 809) , Poland: (+48 800) , UK: (+44 500, +44 800, +44 808 ) and the USA and Canada: (+1 800, +1 866, +1 877, +1 888 ) are free for all Skype users, even if they do not have the SkypeOut service. [5]. SkypeOut calls to toll-free numbers in Belgium (+32 800) do not work.

Fee Changes

On 19 December 2006, Skype accounced that there will be a new pricing structure in 2007. Details on the new scheme are scheduled to be released 18 January 2007. The press release is vague about the new scheme, but it does reveal that there may be a new connection fee.[6]


SkypeIn allows Skype users to receive calls on their computers dialed by regular phone subscribers to regular phone numbers. Permits users to subscribe to numbers in Australia, Brazil, Denmark, Estonia, Finland, France, Germany, Hong Kong, Japan, Poland, Sweden, Switzerland, UK and USA.

For example, a user in San Francisco could create a local telephone number in Helsinki. Callers from Helsinki would pay only local rates to call that number.

Skype voicemail

Skype Voicemail was released on March 10, 2005. This service allows callers to leave voice-mail messages for Skype users who are indisposed.

Skype Voicemail has experienced numerous problems over the past year and users complain that many voice mail calls are never received. Additionally, the SkypeIn service occasionally fails to record certain incoming calls on the program's history page. These problems have not been completely resolved.

Skype chat

Skype supports group text chat with an interface similar to IRC with 100 People.

The Macintosh version uses the same message view style format as Adium, though with a different filename extension. Message view styles made for Adium can be installed for Skype, and they do not even need to be renamed.[20] There are a couple of cosmetic bugs,[21] but ignoring those, Adium styles work without modification. This feature is not present in the Windows, Linux, and Pocket PC versions of Skype.

Skype video calling

On Windows XP (Windows 2000 users require DirectX 9.0 for video calls) and Mac, Skype 2.0 (and above) supports videoconferencing, making Skype one of the few cross-platform video conferencing solutions between Windows and Mac. Skype only supports one-to-one video chat.


Skypecasts was released on May 3, 2006. Skypecasts are live, moderated conversations allowing groups of up to 100 people to converse, moderated by the "host" who is able to mute, eject or pass the virtual microphone to participants when they wish to speak. Skypecasts do not support chat windows to share text information (such as URLs) with participants.

Skype SMS

One of features of Skype 2.5 (and above) is the ability to send SMS messages to mobile phone numbers (a feature commonly used in other IM software such as ICQ, AOL Instant Messenger, Yahoo Messenger and Windows Live Messenger).

Skype web toolbar

The Skype Web Toolbar recognizes phone numbers and Skype Skype. Currently only available for Internet Explorer and Mozilla Firefox on Windows.

Skype Zones

Skype Zones Beta is software powered by Boingo that provides access to Skype through Skype-friendly hot spots.

Skype history logs

A log file is created for each contact on a user's contact list. Log files are stored locally, meaning they are not available if a user switches computers. By default, the option to log conversations is disabled, but can be enabled in the tools / privacy panel.

Skype Hardware

Recently a number of manufactures have launched hardware devices compatible with Skype. These are usually either tethered to a PC, or have a built-in Wi-Fi client to allow calling from Wi-Fi hotspots like the Netgear SPH101 Skype Wi-Fi Phone.

Additional Tools

Skype Beta version 3.0 provides additional tools under "Do More" Submenu. Tools added include the 'Pamela Voice' recorder for recording voice calls, plus many games.


Skype has been criticised over its use of a proprietary protocol, instead of an open standard like H.323, IAX, or SIP, since this makes it impossible for other providers to interact with the Skype network. There are of course clear business reasons for this, since it helps protect the SkypeOut revenue stream from competition.

A design limitation of Skype is that, if given access to an unrestricted network connection, Skype clients can become supernodes. These supernodes hold together the peer-peer network and provide data routing for those behind restrictive firewalls. Unfortunately, these supernodes can generate a significant amount of bandwidth. For this reason some network providers, such as universities, have banned Skype.[citation needed]

A third party paper analyzing the security and methodology of Skype was presented at Black Hat Europe 2006.[22] It analyzed Skype and made these observations:

  • Heavy use of anti debugging techniques (used to deter development of alternative clients, hacking tools)
  • Significant use of obfuscated code (slows reverse engineering, less description of what program code does internal to the executable file)
  • Keeps chatting on the network, even when idle (even for non-supernodes. may be used for NAT traversal)
  • Blind trust in anything else speaking Skype
  • Ability to build a parallel Skype network
  • Lack of privacy (Skype has the keys to decrypt sessions)
  • Heap overflow in Skype
  • Skype makes it hard to enforce a (corporate) security policy
  • "No way to know if there is/will be a backdoor"

Another criticism of Skype has been content filtering. See: Internet censorship in the People's Republic of China.

While available for most operating systems, there is no Skype version for the Palm OS which is widely used in mobile devices like the Treo 700p.

Skype has been heavily criticized in the Linux community for bugs and delays in the Linux version [7].

Legal and political aspects

Skype faces challenges from two main legal and political directions - challenges to its intellectual property, and political concerns by governments who wish to exert more formal control over aspects of their telecommunications systems.

Skype's technology is proprietary and closed to outside review. It is unknown to what extent it can potentially intrude upon other parties' patents and copyrights. It is not unreasonable, therefore, to expect legal challenges from third parties concerning Intellectual Property issues.

Skype also supply Skype-out phonelines without requiring proof of address, which is illegal in some countries.

Legal challenges

Streamcast lawsuit

In January, 2006, StreamCast Networks filed a complaint in U.S. District Court in Los Angeles, accusing Skype of stealing its peer-to-peer technology. The $4.1 billion lawsuit did not initially name eBay, Skype's parent company; however, the lawsuit was amended in a filing with Federal Court in the Central District of California on May 22, 2006, to include eBay and 21 other parties as defendants.

Streamcast seeks a worldwide injunction on the sale and marketing of eBay's Skype Internet voice communication products, as well as billions of dollars in unspecified damages.

IDT lawsuit

On June 1, 2006, Net2Phone (the Internet telephone unit of IDT Corp.) filed a lawsuit against eBay and Skype accusing the unit of infringing U.S. Patent 6,108,704 , which was granted in 2000.[23]

Political issues

China 2005

For a brief period, SkypeOut was blocked in some regions of mainland China (notably Shenzhen) by the operator China Telecom for undisclosed reasons; it has been speculated that this may relate to SkypeOut's ability to take lucrative international and long-distance business away from the People's Republic of China's state-controlled telecommunications companies.

Skype is one of many companies (others include AOL, Google, Microsoft, Yahoo, Cisco) which have cooperated with the Chinese government in implementing a system of Internet censorship in mainland China. Critics of such policies argue that it is wrong for companies to assist in such policies, which might allow them to profit from censorship and restrictions on freedom of the press and freedom of speech. Human rights advocates such as Human Rights Watch and media groups such as Reporters Without Borders state that in their view, if companies stopped contributing to the authorities' censorship efforts the government could be forced to change.[24]

Niklas Zennstrom, chief executive to Skype, told reporters that its joint venture partner in China is operating in compliance with domestic law. "Tom Online had implemented a text filter, which is what everyone else in that market is doing," said Mr Zennstrom. "Those are the regulations." "I may like or not like the laws and regulations to operate businesses in the UK or Germany or the US, but if I do business there I choose to comply with those laws and regulations. I can try to lobby to change them, but I need to comply with them. China in that way is not different."

France 2006

In September 2005, the French Ministry of Research, acting on advice from the general secretariat of national defence, issued an official disapproval of the use of Skype in public research and higher education; some services are interpreting this decision as an outright ban. The exact reasons for the decision were not given, but speculatively may relate to issues noted earlier, relating to inability to monitor the nature of information being communicated, possible extreme resource usage, or unknown potential actions of the software.

India 2006

In December 2006, the Government of India announced they are preparing a crackdown on VoIP services, citing security risks and loss of revenue. The clampdown is targeted at outsourcers and other Indian IT businesses that use foreign owned VoIP services, such as Skype and Yahoo!, to cut their phone bills and evade the six percent revenue share and 12 percent tax imposed on local services by the government. According to the The Times of India, companies must reveal the names of licensed service providers they purchase bandwidth and internet telephony minutes from. Companies will also have to undertake that they will not use the services of unlicensed internet service providers.

Skype group (corporate)

On October 14, 2005, eBay acquired the company for €1.9 billion in cash and stock, plus an additional €1.5 billion in rewards (earn out) if goals are met by 2008.[25][26]

Competition and alternatives

Open source alternatives

  • Ekiga: A free application that supports both H.323, SIP, audio and video. Ekiga was formerly known as GnomeMeeting. So far works only with various Linux based systems. No version for Microsoft Windows has been released yet, but there is a working snapshot available.
  • Kiax[8]: VoIP application based on IAX.
  • PSI: The current Beta version has protocol support for Google Talk.
  • Switchboard: Free VoIP applet which works from within a web browser. Works on Windows, Mac, Linux, and any other Java enabled platform. No installation necessary.
  • Tapioca: Includes support for Google Talk.
  • WengoPhone: A free VoIP application based on SIP open standard.

Closed source alternatives

  • amiciPhone: A secure peer-to-peer VoIP application
  • Google Talk: A popular service provided by Google
  • Gizmo Project: A closed source VoIP application based on SIP open standard and uses SRTP between clients. Now offering free landline/cell calls to over 60 countries
  • iCall: A closed source free VoIP application based on SIP open standard and providing free PC to Phone calling in the US and Canada.
  • Jajah: Alternative where no headset, no download, no installation and no broadband connection is necessary. A VoIP call gets activated between two normal phones.
  • Secure Shuttle Transport (SST): Free encryption and secure messaging software including VoIP and video. Works on PCs running Windows 98 or higher.
  • Raketu: A VoIP service that combines communication, information, and entertainment. Its integrated multi-messenger allows communication with contacts from AOL Instant Messenger, ICQ, MSN Messenger, Google Talk, Yahoo Messenger and Skype.
  • SightSpeed: Free video and voice calling service supporting Mac & Windows. Also allows phone out and in calling.
  • Parlino: A VoIP network based on open standard SIP-protocols, launched by Parlino S.A.
  • Vbuzzer: A VoIP softphone and service as well as an active advocator of SIP open standard
  • VoipBuster: A VoIP application offering 300 minutes per week of free calls to landlines in many countries, including the EU, USA, Australia, etc.
  • VoipStunt: A VoIP application offering 300 minutes per week of free calls to landlines in many countries, including the EU, USA, Australia, etc.
  • Zfone: A solution of Phil Zimmermann (inventor of PGP) to encrypt VoIP (SIP) sessions, protocol published as IETF draft. [9]
  • TipicIM: A free VoIP application, Videocalling based on XMPP/Jabber and Speex audio codec support
  • [ClosedTalk]®: A secure VoIP software free from CE-Infosys for Business/Personal use. Works on PCs running Windows 2000/XP. [ClosedTalk]" exposes �man in the middle� attacks by displaying a short security message on both caller screens for comparison.
  • BT Communicator: A VoIP service from British Telecom (BT plc.)

See also

  • Skype Protocol
  • Presence information
  • Voice over IP
    • Comparison of VoIP software
  • Instant messaging
    • Comparison of instant messaging clients
    • Comparison of instant messaging protocols
  • Videoconferencing
  • Secure communication
  • Skype Journal: An independent online magazine about Skype
  • Nuvvo eLearning Service: an on-demand service with SkypeWeb Presence integration


  1. ^ Jaanus Kase. Skype is expanding engineering to Prague. Skype Blogs. Retrieved on 2006-12-05.
  2. ^ Interview with Jaanus Kase from Skype. KDE News. Retrieved on 2006-06-13.
  3. ^ Skype Privacy FAQ. Skype. Retrieved on 2006-12-05.
  4. ^ "VoIP suffers identity crisis", The Register, June 15, 2004.
  5. ^ Harry Max. Skype: The Definitive Guide. Retrieved on 2006-08-22.
  6. ^ FileMon for Windows. Sysinternals. Retrieved on 2006-06-17.
  7. ^ Bruno Giussani. Swiss magazine digs deeper in social blog. Lunch over IP. Retrieved on 2006-06-17.
  8. ^ Fear of a Skype Planet. Paul Kedrosky. Retrieved on 2006-06-17.
  9. ^ Skype supernodes sap bandwidth. Computerworld. IDG. Retrieved on 2006-06-17.
  10. ^ Jack McCarthy. China bans Skype. InfoWorld. Retrieved on 2006-06-17.
  11. ^ eBay Completes Acquisition of Skype. eBay. Retrieved on 2006-06-17.
  12. ^ Skype Launches Next Generation Free Internet and Video Calling for Everyone. Skype. Retrieved on 2006-06-17.
  13. ^ Skype to Announce Disruptive Pricing Strategy for SkypeOut Retrieved: December 19, 2006
  14. ^ [1]
  15. ^ [2]
  16. ^ Jaanus. Eight million online. Skype Blogs. Retrieved on 2006-11-08.
  17. ^ International carriers' traffic grows despite Skype popularity. TeleGeography Report and Database. Retrieved on 2006-12-07.
  18. ^ Skype End of Service Announcement. Retrieved on 2006-12-17.
  19. ^ SkypeOut Unlimited Calling. Retrieved on 2006-12-17.
  20. ^ Adding chat styles to Skype. Retrieved on 2006-06-13.
  21. ^ Adium message styles and Skype (1 updates). Soeren Says. Retrieved on 2006-06-13.
  22. ^ Philippe BIONDI and Fabrice DESCLAUX. Silver Needle in the Skype. blackhat. Retrieved on 2006-03-02.
  23. ^ Pallavi Gogoi. "Skype Under Attack", Business Week, McGraw Hill, June 6, 2006.
  24. ^ Skype uses peer-pressure defense to explain China text censorship. The Register. Retrieved on 2006-06-18.
  25. ^ eBay Completes Acquisition of Skype. Skype. Retrieved on 2006-06-12.
  26. ^ "eBay to buy Skype in $2.6bn deal", BBC, September 12, 2005.

External links

  • Official Skype website
  • Scientific Research on Skype (Reverese Engineering, etc.)
  • White paper on Skype, focus on supernodes
  • Skype Security Evaluation by Tom Berson (Anagram Laboratories)
  • Graze the page of Skype
  • Paper discussing Skype's internals from a security perspective (Black Hat Europe 2006) - Philippe Biondi & Fabrice Desclaux
  • Skype, Zennstrom, Friis Et Al Sued for RICO Violations
  • Kodak Photo Voice for Skype
  • Skype to Charge for Unlimited Phone Call Plan
  • Detecting Skype and P2P traffic - A general identification method
Retrieved from ""