A possible solution to this would be to use Zfone over TOR. See www.zfone.org The RTP clients would need to support TCP to use TOR - See http://research.edm.luc.ac.be/jori/thesis/onlinethesis/chapter5.html#5.2.2 However TOR is really not ideal for low latency traffic like real time voice. Just using Zphone seems like the best future option. Once support is built into new VOIP hardware and the transition to VOIP becomes global this will hopefully completely prevent the current routine monitoring of the worlds telephone calls by countries with little regard for human rights such as the USA, and by econonic intelligence gathering systems currently used for large-scale commercial theft and invasion of privacy like Echelon. ________________________________ From: owner-or-talk@xxxxxxxxxxxxx on behalf of Taka Khumbartha Sent: Thu 08/03/2007 04:10 To: or-talk@xxxxxxxxxxxxx Subject: Re: blog about tor and skype -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 well, 1.) Skype Call Traced http://archives.seul.org/or/talk/Aug-2006/msg00232.html and http://archives.seul.org/or/talk/Aug-2006/msg00252.html also directly relevant to my point 2.) need i mention skype is closed-source? and 3.) when starting Tor, "This is experimental software. Do not rely on it for strong anonymity." conclusion: don't mix a weak link with a weaker link and expect a reliable chain :) -----BEGIN PGP SIGNATURE----- iD8DBQFF74yZXhfCJNu98qARCGFmAKCODG3fE8GGYFrSxmZ8l3MHicpbmgCgvBms 4BFNKWNyB7Pl7TaKk6GarXo= =0hXP -----END PGP SIGNATURE-----
<<winmail.dat>>