While this is an interesting technology, I would not recommend that it be used for any private communications....
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Peer-to-peer services allow telephone calls to be routed through the privately owned equipment of one or more unknown individuals. This raises a number of confidentiality, integrity and availability concerns, and little information is available about what, if any, security controls these services have put in place to protect your telephone calls.
Would you be upset if an unknown third party was able to eavesdrop on your call? What if they were able to reroute it to a different destination? Or if they were able to disrupt your service? If the answer to all three of these questions is "no," then by all means give peer-to-peer telephone a shot. Otherwise, until the security implications are addressed, you probably want to think twice about adopting this emerging technology.
For more information on peer-to-peer VoIP security, read Skype: Its dangers and how to protect against them elsewhere on this site.
Dig Deeper on BYOD and mobile device security best practices
Related Q&A from Mike Chapple
It's not possible to eradicate the risk of DoS attacks, but there are steps infosec pros can take to reduce their impact. Mike Chapple shares ...continue reading
The HHS OCR ruled that healthcare ransomware attacks are HIPAA violations, so these covered entities need to react according to the HHS's guidance. ...continue reading
HIPAA regulations incorporate NIST guidelines and standards, so do healthcare organizations need to be compliant with both? Expert Mike Chapple ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.