FINDING · DETECTION
TOM-Skype keyword list encryption evolved from a simple XOR cipher in versions 3.6/3.8 to 256-bit AES-ECB in versions 5.0/5.1. Surveillance traffic was encrypted with DES-ECB using hardcoded ASCII keys embedded in the binary (SURVEIL_KEY4.0 = 'X7sRUjL\0'; SURVEIL_KEY3.6 = '32bnx23l'), both recovered via known-plaintext attack and DLL injection respectively.
From 2011-knockel-three — Three Researchers, Five Conjectures: An Empirical Analysis of TOM-Skype Censorship and Surveillance · §2.1.1–§2.1.3 · 2011 · Free and Open Communications on the Internet
Implications
- Hardcoded secrets in client binaries offer no durable protection—reverse engineering reliably extracts them; any censorship-resistant messaging system that embeds keys in the client binary should assume those keys are public.
- ECB mode for both AES and DES keyword-list encryption provides no semantic security; if a censor wants operational security for its blacklist, authenticated encryption with random IVs is the minimum bar.
Tags
Extracted by claude-sonnet-4-6 — review before relying.