LinuxCon: Building a secure IP telephony system
Posted Oct 2, 2009 9:24 UTC (Fri) by NAR
Parent article: LinuxCon: Building a secure IP telephony system
Wiretaps that are court authorized can still be executed, he said, perhaps by installing logging or audio recording software on the caller's computer. Granting the access to place such software is no different than granting access to an office to hide a bug inside the ceiling
It's not just about getting access, it's about wiretapping without the wiretapped person knowing it. Let's imagine that the FBI turns up at Don Corleone and they want to install some spyware on his computer. Would Don Corleone use that computer anymore? On the other hand if the infrastructure is modified, hopefully Don Corleone wouldn't know about that and would still discuss "business" over the phone.
I also can't help to wonder if those heads of states would enable their subjects to use this technology...
to post comments)