<div dir="ltr">Alex, the usual use-case for business use is PSTN -> SIP.. so it hits BOTH networks.<div><br></div><div>Unless there's peering extremely high up and both ends are on voip phones so it never hits the PSTN, though.. but you can't count on that being the case.<div>
<br></div><div><div dir="ltr"><font face="Verdana, Arial, Helvetica, sans-serif"><span style="font-size:13px"><span style="font-size:small">-Avi Marcus</span><br><span style="font-size:small">BestFone</span></span></font></div>
<br>
<br><br><div class="gmail_quote">On Mon, Dec 19, 2011 at 3:09 PM, Alex Balashov <span dir="ltr"><<a href="mailto:abalashov@evaristesys.com">abalashov@evaristesys.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
<div class="im">On 12/19/2011 07:56 AM, Avi Marcus wrote:<br>
<br>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
Ah I forgot that SIP INFO for DTMF and TLS would be enough... but<br>
maybe not for the guidelines..<br>
</blockquote>
<br></div>
The guidelines suffer from a severe lack of precision, and general lack of awareness of the variety of implementational possibilities.<div class="im"><br>
<br>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
And yes, it's possible to con/bribe/hack the telco's.. but since the<br>
calls are going over the PSTN anyway, you remove the entire "public"<br>
part of the call from being open. I presume it's at least better if<br>
that's the only opening..<br>
</blockquote>
<br></div>
Yes, but my argument was that the PSTN part is not so materially less "public". :-) Another thing to consider is that the technology to tap traditional PSTN circuits has been around for decades; the options are both more better-established and "low-tech".<br>
<br>
As I always tell people, if I had something to hide and knew that someone was looking to wiretap me, I would take my chances with an unencrypted VoIP call over the public Internet any day over the PSTN. Techniques for tapping the PSTN are just so much more well-understood and established. That's kind of a "security by obscurity" argument, owing to the relative newness of VoIP, but still. The average private investigator for hire can tap analog lines, and probably even PRIs. I don't have the sense that they can (yet?) take for granted tapping IP conversations. Also, the architecture of the PSTN is inherently much more centralised; the tap points are much more well-defined and concentrated, and far more static.<div class="HOEnZb">
<div class="h5"><br>
<br>
-- <br>
Alex Balashov - Principal<br>
Evariste Systems LLC<br>
260 Peachtree Street NW<br>
Suite 2200<br>
Atlanta, GA 30303<br>
Tel: <a href="tel:%2B1-678-954-0670" value="+16789540670" target="_blank">+1-678-954-0670</a><br>
Fax: <a href="tel:%2B1-404-961-1892" value="+14049611892" target="_blank">+1-404-961-1892</a><br>
Web: <a href="http://www.evaristesys.com/" target="_blank">http://www.evaristesys.com/</a><br>
<br>
--<br>
______________________________<u></u>______________________________<u></u>_________<br>
-- Bandwidth and Colocation Provided by <a href="http://www.api-digital.com" target="_blank">http://www.api-digital.com</a> --<br>
<br>
asterisk-biz mailing list<br>
To UNSUBSCRIBE or update options visit:<br>
<a href="http://lists.digium.com/mailman/listinfo/asterisk-biz" target="_blank">http://lists.digium.com/<u></u>mailman/listinfo/asterisk-biz</a><br>
</div></div></blockquote></div><br></div></div></div>