Newbee ..- encrypted calls/SMS

David Pottage david at
Fri Apr 25 17:39:22 CEST 2008

On Fri, April 25, 2008 2:18 pm, Crane, Matthew wrote:

> Yes, I understand that, that is why I'm thinking of this approach.  My
> idea was to use analog voice transforms and their inverse with
> properties that would preserve most of the codec performance.  But it
> would be awfully difficult to sync up the inverse on the other end
> without a data connection, I expect that with voice calls that delay can
> be added and removed without warning.

I don't think this is a practical idea, even if it would work (which I
doubt). The problem is that unlike cyphers like PGP, analogue audio
cyphers are fairly easy to break with modern computers, and anyone
attempting to eavesdrop on your voice call will quite well resourced.

Analogue audio scramblers are probably helpful for wired phone calls where
you might be worried about a low tech attack such as a Hotel telephonist
recording your phone call to your mistress, and then using it to blackmail
you, but for GSM calls, the air interface between your handset and the
base station is usually encrypted using the A5 cypher. So the only way
someone can listen to your call is by having access to the telephone
company switch. This could be via hacking, a corrupt employee, or lawful
intercept. Either way the eavesdropper is likely to have access to all the
equipment he needs to decrypt a simple voice scrambled call.

The way I see it, the only way you can get encrypted voice calls is either
to wait until both you and the other party are near WiFi access points,
and do it over VOIP, or to do VOIP over GSM, and put up with the huge
latency, which will give you a walke-talkie like connection.

David Pottage

Error compiling committee.c To many arguments to function.

More information about the community mailing list