Feeds

Skype: Microsoft's $8.5 billion identity tool

With VoIP on the side

Using blade systems to cut costs and sharpen efficiencies

Open...and Shut In 2005, eBay bought Skype for $2.6 billion to bring voice communications to the online auction site, claiming the combination would "revolutionise the ease with which people can communicate through the internet." Four years later, eBay sold Skype for $2.75 billion because no one wanted to talk to the other party in a transaction.

Now that Microsoft has picked up Skype in an $8.5 billion deal, let's hope that it appreciates what eBay never did: Skype is more valuable as an identity tool than as a VOIP service. Identity is the Holy Grail for the Internet, which is why Google and Facebook desperately want users to be themselves, and not a pseudonym.

Google has been more upfront about this, perhaps because Facebook doesn't really have to coax users into using their real names. Facebook is where you hang out with high school friends and that person you met at a bar: fake identities just don't work very well for true social networking.

In other words, Facebook has identity data, and Google wants it. Skype? It could help Microsoft map the identities of over 100 million Skype users, adding to the more than 500 million MSN users Microsoft claims. Such users, however, are largely anonymous. I have an MSN account (two or three, actually), and use them under different names for different reasons (mostly to collect spam when I sign up for things online).

And I'm one of the "good guys." The proliferation of fake online identities is a real problem, with as much as 40 per cent of website user accounts being fraudulent.

Adding Skype, which only works if the two (or more) parties to a voice or IM chat actually know the identity of the person on the other end, can provide a real richness to Microsoft MSN user data, and also offers a platform for further mapping out identity online. I have been surprised by how mainstream Skype has become among older, less technically savvy people that I know.

Such people aren't hiding behind pseudonyms. They want their children living abroad to be able to easily find and add them as contacts. Yes, there are great reasons for Microsoft to use Skype's collaboration features in its Office and other products. But just as eBay could have benefited much more from using Skype to add identity data to its online transactions, further deepening trust between buyers and sellers, so too might Microsoft find Skype's identity data more useful than its VOIP service.

Even as the web makes it easy to do business with an obscure buyer or seller on the other side of the globe, the need for trust - for trusting the other's identity - has never been greater.

Skype offers communication tools, yes. But it's ability to deliver identity is much more valuable. ®

Matt Asay is senior vice president of business development at Strobe, a startup that offers an open source framework for building mobile apps. He was formerly chief operating officer of Ubuntu commercial operation Canonical. With more than a decade spent in open source, Asay served as Alfresco's general manager for the Americas and vice president of business development, and he helped put Novell on its open source track. Asay is an emeritus board member of the Open Source Initiative (OSI). His column, Open...and Shut, appears twice a week on The Register.

The smart choice: opportunity from uncertainty

More from The Register

next story
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Black Hat anti-Tor talk smashed by lawyers' wrecking ball
Unmasking hidden users is too hot for Carnegie-Mellon
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.