DEFCON 15: Z-Phone
Sign in to YouTube
Sign in to YouTube
Sign in to YouTube
Uploaded on Jan 29, 2011
Speaker: Philip R. Zimmermann
The time for secure encrypted VoIP for the masses is upon us. The Zfone Project has come a long way in the two years since Phil Zimmermann demoed a prototype at Black Hat. It's now a family of products, running on Symbian and Windows mobile phones, soft VoIP clients on Mac OS X, Windows, Linux, and in the Asterisk PBX, in both open source and commercial products. Zfone lets you whisper in someone's ear from a thousand miles away.
Phil will be explaining the ZRTP protocol used by Zfone, and demoing it. The ZRTP protocol does not rely on a PKI. It also does not rely on SIP signaling for the key management, and in fact does not rely on any servers at all. This means your VoIP security doesn't depend on VoIP service providers who don't always act with your best interests in mind. ZRTP performs its key agreements and key management in a purely peer-to-peer manner over the RTP packet stream. And it supports opportunistic encryption by auto-sensing if the other VoIP client supports ZRTP.
The law enforcement community will be understandably concerned about the effects encrypted VoIP will have on their ability to perform lawful intercepts. But what will be the overall effects on the criminal justice system if we fail to encrypt VoIP? Historically, law enforcement has benefited from a strong asymmetry in the feasibility of government or criminals wiretapping the PSTN. As we migrate to VoIP, that asymmetry collapses. VoIP interception is so easy, organized crime will be able to wiretap prosecutors and judges, revealing details of ongoing investigations, names of witnesses and informants, and conversations with their wives about what time to pick up their kids at school. The law enforcement community will come to recognize that VoIP encryption actually serves their vital interests.
For more information visit: http://bit.ly/defcon15_information
To download the video visit: http://bit.ly/defcon15_videos
Standard YouTube License
- 52:57 DEFCON 19: Chip & PIN is Definitely Broken ( w speaker)by Christiaan008 Featured 8,669
- 51:38 DEFCON 19: Cipherspaces/Darknets: An Overview Of Attack Strategies (w speaker)by Christiaan00824,950 views
- 49:40 DEFCON 17: Search And Seizure Explained - They Took My Laptop!by Christiaan00817,764 views
- 45:53 DEFCON 17: Why Tor is Slow, and What We're Doing About Itby Christiaan0085,813 views
- 49:59 DEFCON 20: The Art Of The Conby Christiaan00814,038 views
- 18:08 DEFCON 16: Hijacking the Outdoor Digital Billboard Networkby Christiaan00815,471 views
- 52:17 DEFCON 20: Safes and Containers: Insecurity Design Excellenceby Christiaan0084,165 views
- 55:02 DEFCON 17: Failureby Christiaan00896,431 views
- 51:07 DEFCON 20: Anonymous and the Online Fight for Justiceby Christiaan0088,136 views
- 49:34 DEFCON 19: And That's How I Lost My Eye: Exploring Emergency Data Destruction (w speaker)by Christiaan00815,875 views
- 39:01 DEFCON 20: Subterfuge: The Automated Man-in-the-Middle Attack Frameworkby Christiaan0084,846 views
- 42:52 DEFCON 16: zfoneby Christiaan0081,772 views
- 1:04:58 DEFCON 20: Black Opsby Christiaan0088,705 views
- 40:47 DEFCON 19: Steal Everything, Kill Everyone, Cause Total Financial Ruin! (w speaker)by Christiaan00835,335 views
- 46:50 DEFCON 20: Changing the Security Paradigm: Taking Back Your Networkby Christiaan0083,355 views
- 43:30 DEFCON 20: Rapid Blind SQL Injection Exploitation with BBQSQLby Christiaan0085,552 views
- 29:37 DEFCON 20: Defeating PPTP VPNs and WPA2 Enterprise with MS-CHAPv2by Christiaan0083,482 views
- 49:00 DEFCON 17: Cracking 400,000 Passwords, or How to Explain to Your Roommate why Power Bill is a Highby Christiaan00848,676 views
- 45:15 DEFCON 20: Into the Droid: Gaining Access to Android User Databy Christiaan0082,142 views
- 48:18 DEFCON 15: The Science of Social Engineering: NLP, Hypnosis and the science of persuasionby Christiaan0087,044 views
- Loading more suggestions...