Q

Can an attacker gain mobile device data through a peer-to-peer (P2P) network?

While peer-to-peer telephone services, such as Skype, Free World Dialup (FWD) and Ooma, are an interesting technology, expert Mike Chapple does not recommend their use for any private communications.

Can an attacker gain important and private information from my phone through a peer-to-peer network?
Peer-to-peer telephone services, such as Skype, Free World Dialup (FWD) and Ooma, offer users a way to save significant money on telephone services. By leveraging peer-to-peer networks to route calls around the world, every call becomes a local one.

While this is an interesting technology, I would not recommend that it be used for any private communications.

Peer-to-peer services allow telephone calls to be routed through the privately owned equipment of one or more unknown individuals. This raises a number of confidentiality, integrity and availability concerns, and little information is available about what, if any, security controls these services have put in place to protect your telephone calls.

Would you be upset if an unknown third party was able to eavesdrop on your call? What if they were able to reroute it to a different destination? Or if they were able to disrupt your service? If the answer to all three of these questions is "no," then by all means give peer-to-peer telephone a shot. Otherwise, until the security implications are addressed, you probably want to think twice about adopting this emerging technology.

For more information on peer-to-peer VoIP security, read Skype: Its dangers and how to protect against them elsewhere on this site.

More information:

  • In a Security Wire Weekly podcast, Andrew Christensen of FortConsult explains how the Tor peer-to-peer network can be hacked.
  • A SearchSecurity.com reader recently asked Mike Chapple, "What warning signs will indicate the presence of a P2P botnet?"
  • This was first published in January 2009

    Dig deeper on Handheld and Mobile Device Security Best Practices

    Pro+

    Features

    Enjoy the benefits of Pro+ membership, learn more and join.

    Have a question for an expert?

    Please add a title for your question

    Get answers from a TechTarget expert on whatever's puzzling you.

    You will be able to add details on the next page.

    0 comments

    Oldest 

    Forgot Password?

    No problem! Submit your e-mail address below. We'll send you an email containing your password.

    Your password has been sent to:

    SearchCloudSecurity

    SearchNetworking

    SearchCIO

    SearchConsumerization

    SearchEnterpriseDesktop

    SearchCloudComputing

    ComputerWeekly

    Close