A J Stiles wrote: > On Wednesday 22 Jul 2009, James Brown wrote: > >> 1. How can I maintain my anonimity when establishing this [IAX tunnelled >> > through SSH] connection? > > Using the mechanisms already built into SSH. If you are concerned about MITM > attacks, then you will need a secure backchannel to exchange key fingerprints > beforehand. > > You aren't anonymous to the far end of the connection; that's kind of the > point. You always know who is leaning over and whispering in your ear. > > >> How can I be sure that an owner of far host don't write logs and don't >> give or sell or etc. them to the Government? >> > > Because the person on the far end is someone you trust. Otherwise you > wouldn't be talking to them. Beside which, this problem exists with all > communication channels. > > If your data passes through some intermediate host over which you have no > control, well, it's encrypted so useless to them. And once your used keys > are in the public domain, then they could have made it all up :) > > >> I don't want let them know >> not only about I talked but my ip-adress and my phisical location too. >> > > Unless you are on a business-grade service, your IP address changes > regularly. > You might be able to use some TOR variant, though I have no practical > experience of this. Beside which, you do not know for a fact that Skype does > not pass on information you would rather it did not to someone you would > rather it did not. > >
To have somebody you trust is very difficult. Even you can trust anybody he can be tort by somebody else :-) , for example. It needs to have a technical system which be able to give you needed guaranies for your security and anonimity. It will be very good if it is be created a VoIP network running like Tor. But I don't know anyone working like Tor. But the Tor itself doesn't work with UDP using in VoIP, only with TCP. -- To UNSUBSCRIBE, email to debian-amd64-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org