Chain of Communication

Human – Device – Network – Device – Human
To ensure privacy, each link in this chain requires security.

Network

We have learned that conversations on the telephone network are being tapped. This was already true in the ISDN network and is even more so in the All-IP network. 
To secure the data in the network, we use ZRTP as the encryption protocol. In the paragraph "ZRTP" you will find some details on this.

Divices

To encrypt data, we need a computer. The performance of a normal PC or smartphone is sufficient for this purpose. Unfortunately, it has been found that all common computer systems can be taken over by malware, especially if a large number of applications are installed and the users visit different websites on the Internet.
Once this has happened, it is easy for the attacker to deactivate encryption software or to leak the unencrypted data stream. In addition to the usual computer viruses, there is also the danger of manipulating the CPU itself. The chapter "RISC-5 CPU" explains the risk and our solution approach

Human

An important limitation of any security system is that it only protects, when it is used. Elaborate encryption systems are often not used by users because it is much easier to quickly make a normal phone call.

We have therefore put some effort to make it possible for the user to use a normal SIP telephone and get the security automaticallyt.


This way, every link and thus the communication chain is secure!