Silver Needle in the Skype

Almost everything is obfuscated (looks like /dev/random)
Peer to peer architecture
many peers
no clear identification of the destination peer.
Automatically reuse proxy credentials
Traffic even when the software is not used (pings, relaying). Impossibility to distinguish normal behavior from information exfiltration.