The Essential Guide to VoIP Privacy

Updated: April 30, 2009

People generally assume that their private phone calls are just that: private . VoIP users, however, shouldn't take privacy for granted.

The problem with most VoIP calls is that they travel over the Internet, a very public network. This means that calls are vulnerable to snooping at various points throughout their journey. And even private-network VoIP calls can be tapped if access can be gained to the physical wiring. As a result, business competitors, employees, criminal gangs, tech hobbyists and just plain snoops can all listen in to a business's outgoing and incoming VoIP calls. All that's needed is a packet-sniffing program , easily downloaded from the Internet, and perhaps a tiny piece of hardware to tap into a physical wire undetectably.

But the news isn't all bad. Methods and systems are available to safeguard VoIP traffic. And while VoIP is susceptible to digital eavesdroppers, the technology also commonly provides an array of built-in features that can actually enhance users' privacy.

Protection Measures

VoIP calls are vulnerable to interception at two stages: the call setup and the call data flow. Tapping into the call setup provides the intruder with information on who called a particular number, something that may be of interest to a competitor, employee or spouse. Monitoring the call data flow allows the intruder to actually listen to the call as it is taking place.

Security installed on network perimeter devices, such as routers and gateways , can protect VoIP-call confidentiality by encrypting both the call setup traffic and the audio stream using technologies such as TLS (Transport Layer Security), ZRTP (Z Real-Time Transport Protocol), SRTP (Secure Real-Time Transport Protocol) and IPSec (IP security). Meanwhile, businesses using a VPN (virtual private network) can utilize the technology's built-in encryption for gateway-to-gateway VoIP-call protection. This security is automatically supplied to all VoIP users - even traveling employees connecting to the VPN from a laptop. Internal VoIP security can be bolstered by running the technology on the enterprise network , allowing the infrastructure's usual safeguards to keep calls safe from internal snoops.

Businesses and individuals subscribing to a hosted-VoIP service can take advantage of the encryption many providers have incorporated into their software. Skype Ltd. , for example, has added encryption support into its proprietary client software.

There is a growing awareness of the issue and VoIP encryption tools are becoming available, most notably Zfone - the encrypted VoIP project created by Phil Zimmermann, the inventor of the leading general encryption solution, PGP .

Privacy Support

Although unprotected VoIP calls are vulnerable to various types of snoops, VoIP itself can help users maintain their privacy. Various IP-based features allow users to isolate themselves from unwanted callers, making it much more difficult for these individuals to intrude into daily life.

  • Anonymous-call rejection: This feature allows users to reject incoming calls from people who have blocked their phone number and name. The capability effectively screens out telemarketers, cranks and other individuals who wish to hide their identifies.
  • Outbound-caller ID blocking: By stopping the transmission of caller-ID data, the user can hide his or her identity (although that also raises the possibility of having the call blocked at its destination by anonymous call-rejection).
  • Call blocking: This feature enables users to screen calls from specific phone numbers.
  • Selective call forwarding: By forwarding specified incoming calls to other destinations (such as an office or home line), the user can keep certain types of calls from disrupting business or family activities.
  • Selective call acceptance and rejection: This feature lets users accept or reject certain incoming calls depending on specified criteria.
  • Do not disturb: By directing all incoming calls to voice mail without ringing the phone, users can steer clear of incoming calls without potentially missing important news.
  • Extra lines: Many VoIP services allow customers to purchase additional lines at reduced rates. Such auxiliary lines allow users to tier their phone service in a way that reserves one number for close personal and business contacts and then dedicates one or more other lines for various types of causal acquaintances.
Featured Research
  • Is Your Phone System Stealing Profits?

    Having the wrong phone system can dramatically cut into your profits. Despite this, many businesses just sign up for a plan or platform that seems ‘good enough’. If you haven’t carefully considered your options and the included features, there’s a very good chance that you are leaving money on the table in some way. more

  • Phone System Technology Showdown

    VoIP and IP telephony are often misconstrued as being the same type of phone system, but the truth is they operate on different technology and deployment methods. This guide will explain the differences between VoIP and IP, go into the pros and cons of both VoIP and IP-PBX, and give insight into which type of phone system will benefit your business the most. more

  • Why Enterprises are Making the Switch to VoIP

    Your phone system is your most important business communication system. It allows you to connect with your employees, prospects, and clients. And wouldn't it be great if there was a solution that helped drive down costs while providing a competitive advantage? more

  • Business Phone System Buyer's Guide

    Communication has been a focal point in business since inception, but the industry is changing drastically in how people connect to one another and what tools and systems they use to do so. Less than 15 years ago, 90% of people relied on landline phone systems for communication. Today, less than 60% of Americans even have a landline and 40% rely solely on their mobile phone. more

  • Ditch Your Fax Servers

    An in-house fax server gives an IT department centralized management and monitoring over the entire enterprise's faxing. This can help your company track usage and better maintain records for auditing and record keeping. However, there are serious drawbacks that come with utilizing an in-house fax server solution and these range from security to cost-prohibitive pricing. more