Nytro Posted December 6, 2011 Report Posted December 6, 2011 I Know Where You are and What You are SharingExploiting P2P Communications to Invade Users’ PrivacyStevens Le Blond Chao Zhang Arnaud Legout Keith Ross Walid DabbousMPI-SWS, Germany NYU-Poly, USA INRIA, FranceABSTRACTIn this paper, we show how to exploit real-time communicationapplications to determine the IP address of a targeteduser. We focus our study on Skype, although other realtimecommunication applications may have similar privacyissues. We first design a scheme that calls an identifiedtargeteduser inconspicuously to find his IP address, whichcan be done even if he is behind a NAT. By calling the userperiodically, we can then observe the mobility of the user.We show how to scale the scheme to observe the mobilitypatterns of tens of thousands of users. We also consider thelinkability threat, in which the identified user is linked to hisInternet usage. We illustrate this threat by combining Skypeand BitTorrent to show that it is possible to determine thefilesharing usage of identified users. We devise a schemebased on the identification field of the IP datagrams to verifywith high accuracy whether the identified user is participatingin specific torrents. We conclude that any Internet usercan leverage Skype, and potentially other real-time communicationsystems, to observe the mobility and filesharing usageof tens of millions of identified users.Download:http://cis.poly.edu/~ross/papers/skypeIMC2011.pdf Quote