TOPICS

MOST ACTIVE

ABOUT VOIPONDER

PARTNERS

NEWS BRIEFS | View All | RSS | Updated: Wed, May 17, 2006 05:07 pm PDT

Why VOIP Needs Crypto

Apr 06, 2006 | Inside: Security

There are basically four ways to eavesdrop on a telephone call. One, you can listen in on another phone extension. Two, you can attach some eavesdropping equipment to the wire with a pair of alligator clips. Three, you can eavesdrop at the telephone switch. Four, you can tap the main trunk lines, eavesdrop on the microwave or satellite phone links, etc.

That’s basically the entire threat model for traditional phone calls. ...Unfortunately, phone calls from your computer are fundamentally different from phone calls from your telephone. Internet telephony’s threat model is much closer to the threat model for IP-networked computers than the threat model for telephony.

Read Full StoryWired News |

Comments

+ Add your comments here

  • ASSOCIATES