On 12/19/2011 07:56 AM, Avi Marcus wrote:
Ah I forgot that SIP INFO for DTMF and TLS would be enough... but maybe not for the guidelines..
The guidelines suffer from a severe lack of precision, and general lack of awareness of the variety of implementational possibilities.
And yes, it's possible to con/bribe/hack the telco's.. but since the calls are going over the PSTN anyway, you remove the entire "public" part of the call from being open. I presume it's at least better if that's the only opening..
Yes, but my argument was that the PSTN part is not so materially less "public". :-) Another thing to consider is that the technology to tap traditional PSTN circuits has been around for decades; the options are both more better-established and "low-tech".
As I always tell people, if I had something to hide and knew that someone was looking to wiretap me, I would take my chances with an unencrypted VoIP call over the public Internet any day over the PSTN. Techniques for tapping the PSTN are just so much more well-understood and established. That's kind of a "security by obscurity" argument, owing to the relative newness of VoIP, but still. The average private investigator for hire can tap analog lines, and probably even PRIs. I don't have the sense that they can (yet?) take for granted tapping IP conversations. Also, the architecture of the PSTN is inherently much more centralised; the tap points are much more well-defined and concentrated, and far more static.
-- Alex Balashov - Principal Evariste Systems LLC 260 Peachtree Street NW Suite 2200 Atlanta, GA 30303 Tel: +1-678-954-0670 Fax: +1-404-961-1892 Web: http://www.evaristesys.com/ -- _____________________________________________________________________ -- Bandwidth and Colocation Provided by http://www.api-digital.com -- asterisk-biz mailing list To UNSUBSCRIBE or update options visit: http://lists.digium.com/mailman/listinfo/asterisk-biz