![]() Table: Factors affecting VoIP Anonymity VoIP Domain Consider the factors in the table below before deciding to use VoIP in Whonix ™. Depending on your threat model, pseudonymous use of VoIP might be appropriate this involves hidden voice communications that take place with known contacts. It is easy to hide the IP address with Whonix ™, but the voice recognition component and slow Tor network speed (latency) are definite obstacles. Īnonymizing VoIP is somewhat difficult, but still possible. Several threat classes have been identified in the literature: social threats eavesdropping, interception and modification of session contents denial of service attacks unauthorized access to VoIP equipment and a sudden interruption of services. VoIP software is complex and has a large attack surface. VoIP can allow you to make a call directly from a computer, a special VoIP phone, or a traditional phone connected to a special adapter. If you are calling a regular phone number, the signal is converted to a regular telephone signal before it reaches the destination. VoIP services convert your voice into a digital signal that travels over the Internet. a technology that allows you to make voice calls using a broadband Internet connection instead of a regular (or analog) phone line.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |