17.12.2012 Views

Viber Communication Security - Bad Request

Viber Communication Security - Bad Request

Viber Communication Security - Bad Request

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

B Bibliography<br />

Appendix B<br />

[1] D. Etherington, “<strong>Viber</strong> gives skype a run for its money on iphone,” December 2010. http:<br />

//gigaom.com/apple/viber-gives-skype-a-run-for-its-money-on-iphone/.<br />

[2] T. Marco, “Are the messages sent between viber users encrypted?,” June 2011. http://www.<br />

quora.com/Talmon-Marco-Are-the-messages-sent-between-<strong>Viber</strong>-users-encrypted.<br />

[3] T. Marco, “<strong>Viber</strong> for iphone updated with free text messaging (comment),” April 2011. http:<br />

//i.tuaw.com/2011/04/01/viber-for-iphone-updated-with-free-text-messaging.<br />

[4] G. V. Michiel Appelman and J. Bosma, “<strong>Viber</strong> communication security - project proposal,”<br />

November 2011. https://www.os3.nl/_media/2011-2012/courses/ssn/viber_<br />

communication_security.pdf?id=2011-2012.<br />

[5] <strong>Viber</strong>, “<strong>Viber</strong> privacy policy,” July 2011. http://www.viber.com/privacypolicy.html.<br />

[6] V. H. Desk, “Traffic encryption policy,” 2011. http://helpme.viber.com/index.php?<br />

/Troubleshooter/Step/View/3.<br />

[7] S. L. Garfinkel, “Voip and skype security,” January 2005. http://skypetips.<br />

internetvisitation.org/files/VoIP%20and%20Skype.pdf.<br />

[8] M. Marjalaakso, “<strong>Security</strong> requirements and constraints of voip,” 2010. http://www.tml.tkk.<br />

fi/Opinnot/Tik-110.501/2000/papers/marjalaakso/voip.html.<br />

[9] W. de Vries, “Fout in verificatiecheck whatsapp maakt meelezen<br />

berichten mogelijk,” May 2011. http://tweakers.net/nieuws/74576/<br />

fout-in-verificatiecheck-whatsapp-maakt-meelezen-berichten-mogelijk.html.<br />

[10] R. Gevers, “Whatsapp security weaknesses,” May 2011. http://rickey-g.blogspot.com/<br />

2011/05/whatsapp-connection-details.html.<br />

[11] R. Gevers, “Hijack whatsapp with your iphone,” May 2011. http://rickey-g.blogspot.com/<br />

2011/05/hijack-someone-elses-whatsapp-with-your.html.<br />

[12] WhatsApp, “Whatsapp legal info,” November 2009. http://www.whatsapp.com/legal/.<br />

[13] eBuddy XMS team, “Q&A on eBuddy XMS’ secure connection,” May 2011. http://blog.<br />

ebuddy.com/index.php/ebuddy-blog/qa-on-ebuddy-xms-secure-connection/.<br />

[14] eBuddy, “Privacy policy,” March 2011. http://www.ebuddy.com/privacy.php.<br />

[15] S. Kovach, “Skype for iphone lets others steal your address book contacts,” September 2011.<br />

http://articles.businessinsider.com/2011-09-20/tech/30178953_1_skype-ios-app.<br />

38

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!