Feeds

SIP pundit fires broadside at Skype

VoIP catfight hots up

  • alert
  • submit to reddit

Secure remote control for conventional and virtual desktops

Skype must marry SIP

Mahy thinks that eventually Skype will have to be connected to SIP, otherwise Skype users will be let unable to talk to the rest of the world.

"Sure, he 'could' use something else, but that would be economic suicide. When asked how he would get PSTN numbers assigned he said he would use partners who are telecom operators to provide these. These providers are already using SIP or H.323 and have no economic incentive to 'each' build a native-Skype interface on the thin margins that Skype is hoping to garner from its customers."

So, Faultline asked why doesn't Mahy write a connection to Skype, using the APIs that Skype is intending to publish: after all, he has 13 million users? "He doesn't have 13 million 'active' users, far from it, so it is really not worth my time. I would rather spend my energy writing a free client with more functionality that is fully open." So does Skype need to talk to SIP clients one day or can it just talk to the PSTN and then route back out to SIP clients?

"That's missing the point, don't you think? Say a Skype user in India wants to communicate with me in California on a SIP network. He can make a basic call through 2 gateways with international toll charges.

"Its unlikely that I will see his correct caller ID, and dead certain that we can't exchange IM, video, presence status, or do file transfers. A pair of implementations using SIP could do this for free over the public Internet."

Talk then turned to the security that Zennstrom says exists in Skype that doesn't exist in SIP. Mahy thinks the Skype approach is inviting viruses, Zennstrom says this is not possible. According to Zennstrom there is little danger of a call through Skype resulting in a route for a virus because the recipient is told there is a call for him and is asked to call out to meet it.

Mahy tells us that there are rapidly appearing firewalls that are deliberately eliminating use of peer-to-peer networks, including the one Skype sits on, because of security issues.

"Once my machine is infected with a virus, that virus can do lots of rude things with the Skype API. The virus could call a PSTN toll or international service from my account and leave it up for days. The virus could spam call my entire buddy list a few times an hour. The virus could turn my computer into a remote-control microphone. These are the kinds of issues that IT administrators are concerned about. Also, many administrators want to block p2p to prevent liability from the RIAA and similar groups. With at least one product the side effect is no Skype."

© Copyright 2004 Faultline

Faultline is published by Rethink Research, a London-based publishing and consulting firm. This weekly newsletter is an assessment of the impact of events that have happened each week in the world of digital media. Faultline is where media meets technology. Subscription details here.

Related stories

VoIP suffers identity crisis
Consumers want big telcos to supply VoIP services
US groups lobby over VoIP regulation
VoIP to transform telecoms market
Skype to mobilise the PDA
Skype secures £11m funding
VoIP will be US broadband killer app

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
Turnbull should spare us all airline-magazine-grade cloud hype
Box-hugger is not a dirty word, Minister. Box-huggers make the cloud WORK
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
Microsoft adds video offering to Office 365. Oh NOES, you'll need Adobe Flash
Lovely presentations... but not on your Flash-hating mobe
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.