Ubiquitous audio: capturing spontaneous collaboration
CSCW '92 Proceedings of the 1992 ACM conference on Computer-supported cooperative work
Going wireless: behavior & practice of new mobile phone users
CSCW '00 Proceedings of the 2000 ACM conference on Computer supported cooperative work
Communications of the ACM - Internet abuse in the workplace and Game engines in scientific research
The character, functions, and styles of instant messaging in the workplace
CSCW '02 Proceedings of the 2002 ACM conference on Computer supported cooperative work
You Don't Know Jack About VoIP
Queue - VoIP
Alliance Addresses VoIP Security
IEEE Security and Privacy
The Session Initiation Protocol: Internet-centric signaling
IEEE Communications Magazine
Proceedings of the 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia and workshop
Hi-index | 0.00 |
In VoIP, proxies are used by end-devices to perform a number of tasks including call setup and routing. Setup and routing is achieved through the exchange of call control messages which are forwarded among all involved proxies as well as the communicating end-devices. This paper will explore the information exchanged in Voice-over-IP (VoIP) call control messages and any possible implications this has on personal privacy. We assess the explicit and implicit deductions that can be made from handling messages in transit and evaluate these with a conceptual anonymity model. We aim to show that profiling is a threat in current VoIP implementations and that this threat becomes increasingly relevant with the growing adoption of VoIP. We consider these facts in light of possible future scenarios whereby VoIP has the potential to become a truly ubiquitous technology.