Problem solve Get help with specific problems with your technologies, process and projects.

Can an attacker gain mobile device data through a peer-to-peer (P2P) network?

While peer-to-peer telephone services, such as Skype, Free World Dialup (FWD) and Ooma, are an interesting technology, expert Mike Chapple does not recommend their use for any private communications.

Can an attacker gain important and private information from my phone through a peer-to-peer network?
Peer-to-peer telephone services, such as Skype, Free World Dialup (FWD) and Ooma, offer users a way to save significant money on telephone services. By leveraging peer-to-peer networks to route calls around the world, every call becomes a local one.

While this is an interesting technology, I would not recommend that it be used for any private communications. Peer-to-peer services allow telephone calls to be routed through the privately owned equipment of one or more unknown individuals. This raises a number of confidentiality, integrity and availability concerns, and little information is available about what, if any, security controls these services have put in place to protect your telephone calls.

Would you be upset if an unknown third party was able to eavesdrop on your call? What if they were able to reroute it to a different destination? Or if they were able to disrupt your service? If the answer to all three of these questions is "no," then by all means give peer-to-peer telephone a shot. Otherwise, until the security implications are addressed, you probably want to think twice about adopting this emerging technology.

For more information on peer-to-peer VoIP security, read Skype: Its dangers and how to protect against them elsewhere on this site.

More information:

  • In a Security Wire Weekly podcast, Andrew Christensen of FortConsult explains how the Tor peer-to-peer network can be hacked.
  • A SearchSecurity.com reader recently asked Mike Chapple, "What warning signs will indicate the presence of a P2P botnet?"
  • This was last published in January 2009

    Dig Deeper on BYOD and mobile device security best practices

    Start the conversation

    Send me notifications when other members comment.

    Please create a username to comment.