Cryptography

Secure voice

Secure voice (alternatively secure speech or ciphony) is a term in cryptography for the encryption of voice communication over a range of communication types such as radio, telephone or IP. (Wikipedia).

Secure voice
Video thumbnail

Best secure and private email services review - guide to Gmail alternatives and encrypted email

Secure your privacy and claim a new encrypted email at these secure and private email services. Follow my guide to gmail alternatives and end-to-end encryption using private email providers as part of degoogleify campaign. I made this channel because I believe standing up against power an

From playlist TUTORIALS & HOW TO's

Video thumbnail

Signal - the most secure messenger for everyone

Signal Private Messenger is the most secure messaging app you can install on your phone. Support me through Patreon: https://www.patreon.com/thehatedone Join my channel and become a member to enjoy perks https://www.youtube.com/channel/UCjr2bPAyPV7t35MvcgT3W8Q/join - or donate anonymous

From playlist TUTORIALS & HOW TO's

Video thumbnail

Quick Look at Google Voice Apps for iOS

Apple recently approved several Google Voice apps on the App Store. We explain why that's rad.

From playlist Quick Looks

Video thumbnail

Quick Look at Google Voice Apps for iOS

Apple recently approved several Google Voice apps on the App Store. We explain why that's rad.

From playlist Quick Looks

Video thumbnail

VoIP Penetration Testing Lessons Learned 1/5

Speakers: - John Kindervag and Jason Ostrom clip 1/5

From playlist ShmooCon 2008

Video thumbnail

DEFCON 19: VoIP Hopping the Hotel: Attacking the Crown Jewels through VoIP

Speaker: Jason Ostrom Sipera VIPER Lab This presentation is about the security of VoIP deployed in hotel guest rooms. What it is, why it benefits administrators and users, and how easily it can be broken. The hospitality industry is widely deploying VoIP. Since 2008, we've seen an increas

From playlist DEFCON 19

Video thumbnail

DEFCON 13: End-to-End Voice Encryption over GSM: A Different Approach

Speakers: Wesley Tanner Nick Lane-Smith Where is end-to-end voice privacy over cellular? What efforts are underway to bring this necessity to the consumer? This discussion will distill for you the options available today, and focus on current research directions in technologies for th

From playlist DEFCON 13

Video thumbnail

DsiN Film Campaign for Secure Internet Use: Online Shopping

The film Secure Online Shopping shows how important it is to know who your business partners are and to only use secure payment options when shopping online. Source: Deutschland Sicher Im Netze (http://bit.ly/cRQoOo)

From playlist awareness

Video thumbnail

23C3: SIP Security

Speaker: Jan Seedorf Status Quo and Future Issues The presentation will give an overview on SIP security issues and show possible weaknesses in current implementations using SIP (Hardphones, Softphones, Gateways). Further, an outlook on the security of future, serverless SIP systems (P

From playlist 23C3: Who can you trust

Video thumbnail

DEFCON 18: HD Voice: The Overdue Revolution 2/4

Speaker: Doug Mohney After kicking around on the back shelf for years, HD voice is finally gaining traction both in the broadband world and the cellular. And the French are leading the way! The audio standards for a POTS (Plain Old Telephone System) call have been frozen since about

From playlist DEFCON 18-2

Video thumbnail

VoIP Penetration Testing Lessons Learned 2/5

Speakers: - John Kindervag and Jason Ostrom clip 2/5

From playlist ShmooCon 2008

Video thumbnail

Introducing Twilio + IU REDCap

A 60-minute webinar about Creating Reports in IU REDCap. REDCap researchers now have more options to communicate using Twilio, a low-cost, third-party platform for communicating using SMS text messages and phone calls. Securely text survey links, alerts and notifications to research part

From playlist IU REDCap

Video thumbnail

DEFCON 16: VoIPER: Smashing the VoIP stack while you sleep

Speaker: N.N.P.Hacker, UnprotectedHex.com With VoIP devices finding their way into the majority of major enterprises and a significant number of residential installations, the possible consequences of a security vulnerability that can be leveraged by malicious hackers are ever increasing.

From playlist DEFCON 16

Video thumbnail

23C3: Mobile phone call encryption

Speakers: Paul Wouters, Leigh Honeywell Encrypting (GSM) mobile phone calls over VPN with an Asterisk PBX To encrypt all your mobile phones to protect it from overzealous eavesdroppers, you are currently limited to using special hardware such as the Cryptophone. The disadvantage of cr

From playlist 23C3: Who can you trust

Video thumbnail

VoIP Encryption in a Surveillance Society

March 7, 2007 lecture by Phillip Zimmermann for the Stanford University Computer Systems Colloquium (EE 380). Phil talks about how the debate on the use of crypto has shifted since the 1990s, when it was a clash between civil liberties and law enforcement - in the 1990s, the crypto debate

From playlist Course | Computer Systems Laboratory Colloquium (2006-2007)

Related pages

Encryption | VINSON | Fishbowl (secure phone) | End-to-end encryption | STU-III | Pseudorandom noise | NSA encryption systems | Thyratron | Secure Communications Interoperability Protocol | Scrambler | Sub-band coding | Cryptography