Feeds

Skype: Microsoft's $8.5 billion identity tool

With VoIP on the side

The Power of One eBook: Top reasons to choose HP BladeSystem

Open...and Shut In 2005, eBay bought Skype for $2.6 billion to bring voice communications to the online auction site, claiming the combination would "revolutionise the ease with which people can communicate through the internet." Four years later, eBay sold Skype for $2.75 billion because no one wanted to talk to the other party in a transaction.

Now that Microsoft has picked up Skype in an $8.5 billion deal, let's hope that it appreciates what eBay never did: Skype is more valuable as an identity tool than as a VOIP service. Identity is the Holy Grail for the Internet, which is why Google and Facebook desperately want users to be themselves, and not a pseudonym.

Google has been more upfront about this, perhaps because Facebook doesn't really have to coax users into using their real names. Facebook is where you hang out with high school friends and that person you met at a bar: fake identities just don't work very well for true social networking.

In other words, Facebook has identity data, and Google wants it. Skype? It could help Microsoft map the identities of over 100 million Skype users, adding to the more than 500 million MSN users Microsoft claims. Such users, however, are largely anonymous. I have an MSN account (two or three, actually), and use them under different names for different reasons (mostly to collect spam when I sign up for things online).

And I'm one of the "good guys." The proliferation of fake online identities is a real problem, with as much as 40 per cent of website user accounts being fraudulent.

Adding Skype, which only works if the two (or more) parties to a voice or IM chat actually know the identity of the person on the other end, can provide a real richness to Microsoft MSN user data, and also offers a platform for further mapping out identity online. I have been surprised by how mainstream Skype has become among older, less technically savvy people that I know.

Such people aren't hiding behind pseudonyms. They want their children living abroad to be able to easily find and add them as contacts. Yes, there are great reasons for Microsoft to use Skype's collaboration features in its Office and other products. But just as eBay could have benefited much more from using Skype to add identity data to its online transactions, further deepening trust between buyers and sellers, so too might Microsoft find Skype's identity data more useful than its VOIP service.

Even as the web makes it easy to do business with an obscure buyer or seller on the other side of the globe, the need for trust - for trusting the other's identity - has never been greater.

Skype offers communication tools, yes. But it's ability to deliver identity is much more valuable. ®

Matt Asay is senior vice president of business development at Strobe, a startup that offers an open source framework for building mobile apps. He was formerly chief operating officer of Ubuntu commercial operation Canonical. With more than a decade spent in open source, Asay served as Alfresco's general manager for the Americas and vice president of business development, and he helped put Novell on its open source track. Asay is an emeritus board member of the Open Source Initiative (OSI). His column, Open...and Shut, appears twice a week on The Register.

Designing a Defense for Mobile Applications

More from The Register

next story
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.