secure encrypted phoning..

Henryk Plötz henryk at
Sat Mar 24 21:08:30 CET 2007


Am Sat, 24 Mar 2007 19:44:36 +0100 schrieb Edwin Lock:

> Maybe a bit OT, but:
> Is there a way to implement the kind of encryption that the
> cryptophones( use? 

In principle, yes. See the FAQ:

| The nice thing about our product is that we have no (trade) secrets,
| and invite everyone to make interoperable products based on the
| published protocol. We believe in standards that are open for anybody
| to join - as long as they go and implement their own product and do
| not steal from our published source.
| We will use all legal means to ensure that no one tries to compete
| with us on the base of our published source. You are perfectly free
| to develop a compatible product on the base of the published
| CryptoPhone protocol, but not using our source.

Henryk Plötz
Grüße aus Berlin
~ Help Microsoft fight software piracy: Give Linux to a friend today! ~

More information about the community mailing list