Blue Box Podcast #7 – December 5, 2005

Synopsis: VoIP security news, comments and opinions


Welcome to Blue Box: The VoIP Security Podcast show #7, a 28-minute podcast from Dan York around news and commentary in the world of VoIP security.

Download the show here (MP3, 26MB) or subscribe to the RSS feed to download the show automatically.

Comments, suggestions and feedback are welcome either as replies to this post  or via e-mail to blueboxpodcast@gmail.com.  Audio comments sent as attached MP3 files are definitely welcome and will be played in future shows.  You may also call the listener comment line at +1-206-338-6654 to leave a comment there.

Jonathan was travelling this week and unable to participate.  We mentioned previously that Bogdan Materna from VoIPShield Systems would be interviewed this week but unfortunately he fell ill and was unable to join us.  We’ll reschedule that interview in the weeks ahead.  Our thanks go out to Tom Cross of Techtionary.com, who provided some content for today’s show.

Show Content:

Comments, suggestions and feedback are welcome either as replies to this post  or via e-mail to blueboxpodcast@gmail.com.  Audio comments sent as attached MP3 files are definitely welcome and will be played in future shows.  You may also call the listener comment line at +1-206-338-6654 to leave a comment there.

Thank you for listening and please do let us know what you think of the show.

One thought on “Blue Box Podcast #7 – December 5, 2005

  1. Mark Collier

    Dan, I listened to the discussion about recording IPT calls. I am not aware of any procedures and policies, but will say that we have been working with one of the major security companies to investigate an application which monitors calls for keywords. The idea is to detect when employees leak sensitive info, such as when an acquisition is about to take place. I don’t know if we will ever build this, but it does raise some interesting questions, like are the rules for monitoring IPT going to be like traditional voice or more like data. Will enterprises start monitoring all calls, just like they can now with email and IM. We will see.
    PS, encryption is generally useless as a countermeasure, when the call is translated by a media gateway to TDM. Just monitor on the TDM side.

Comments are closed.