Why VOIP Needs Crypto
Apr 06, 2006 | Inside:
Security
There are basically four ways to eavesdrop on a telephone call. One, you can listen in on another phone extension. Two, you can attach some eavesdropping equipment to the wire with a pair of alligator clips. Three, you can eavesdrop at the telephone switch. Four, you can tap the main trunk lines, eavesdrop on the microwave or satellite phone links, etc.
That’s basically the entire threat model for traditional phone calls. ...Unfortunately, phone calls from your computer are fundamentally different from phone calls from your telephone. Internet telephony’s threat model is much closer to the threat model for IP-networked computers than the threat model for telephony.
Read Full Story
—Wired News |
+ Add your comments here