Appendix B.Skype Security
This appendix provides a somewhat more technical perspective on the security model that Skype uses to maintain privacy. It assumes that you have read Appendix A, which describes the high-level peer-to-peer (P2P) architecture underlying Skype.
This appendix is for people who are interested in the underlying technical aspects of Skype’s security model. You do not need to read this appendix to use Skype effectively.
In this appendix, you learn:
- How Skype’s security works
- How a Skype session is established and users are authenticated
- How Skype users are authorized
- How encryption is handled
- Where Skype data is stored
- Where to locate more information on Skype security
Skype Security Linked to Architecture
Skype’s security ...
Get Skype™: The Definitive Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.