Last revised by Ali Farshchian,
Feb 18, 06 at 7:11 pm PDT |
Add New Term
The majority of consumer VoIP solutions do not support encryption. As a result, it is relatively easy to eavesdrop on VoIP calls and even change their content. There are several open source solutions like VoIPong or Vomit that facilitate sniffing of VoIP conversations. A modicum of security is afforded due to patented audio codecs that are not easily available for open source applications, however it has not proven effective in the long run in other fields. Some vendors also use compression to make eavesdropping more difficult. However, real security requires encryption and cryptographic authentication which are usually not available at a consumer level.
This text is licensed under the GNU Documentation License. It uses material from the Wikipedia article “VoIP".