Originally posted by: KLin
I believe protocols used with VoIP is encrypted. you'd have to have a listening device on the phone itself. A phone tap is just connected to the POTS line(Tip and Ring) and intercepts the analog signal.
Originally posted by: KLin
I believe protocols used with VoIP is encrypted. you'd have to have a listening device on the phone itself. A phone tap is just connected to the POTS line(Tip and Ring) and intercepts the analog signal.
Originally posted by: KLin
I believe protocols used with VoIP is encrypted. you'd have to have a listening device on the phone itself. A phone tap is just connected to the POTS line(Tip and Ring) and intercepts the analog signal.
Originally posted by: RadiclDreamer
VOIP is harder to intercept
Originally posted by: biggestmuff
mugs, they don't need that level of access. The gov' just needs access to the network at or need a decent sized hub to capture traffic for analysis. Typically, that can be had at the same CO. The major phone companies operate huge interconnecting networks. To them, it's all data.
Originally posted by: SagaLore
Originally posted by: RadiclDreamer
VOIP is harder to intercept
True, since most networks utilize switches now, and the only way to intercept the data is with a span port or some kind of network tap. However, the security problem with VOIP is not sniffing, but now it opens up a door between regular phone systems and your data network since VOIP is typically ran over the existing data infrastructure. I'd be more worried about people dialing into your network and using that as a vector to your servers (or home pc if you're using www voip).
Originally posted by: kalster
its harder, but the government now has a rule to have voip network providers be CALEA compliant. its basically setting up an infrastructure for them to 'tap' calls if and when they want to.
http://www.voip-info.org/wiki/view/CALEA