1996-07-13 - Re: ANNOUNCEMENT: PGPfone Beta 7 Now Available for Download

Header Data

From: “Harry Hochheiser” <harry@tigger.jvnc.net>
To: cypherpunks@toad.com
Message Hash: 7319c0a08da809924da8530aefd9cb6d0eed2a71a6306b922b8a9266f943a37e
Message ID: <199607131509.AA14392@tigger.jvnc.net>
Reply To: N/A
UTC Datetime: 1996-07-13 20:09:07 UTC
Raw Date: Sun, 14 Jul 1996 04:09:07 +0800

Raw message

From: "Harry Hochheiser" <harry@tigger.jvnc.net>
Date: Sun, 14 Jul 1996 04:09:07 +0800
To: cypherpunks@toad.com
Subject: Re: ANNOUNCEMENT: PGPfone Beta 7 Now Available for Download
Message-ID: <199607131509.AA14392@tigger.jvnc.net>
MIME-Version: 1.0
Content-Type: text/plain


On 12 Jul 96 at 21:31, Arun Mehta wrote:

> At 23:38 10/07/96 -0700, Will Price wrote:
> >ANNOUNCEMENT: PGPfone Beta 7 Now Available for Download
> 
> Sorry if this has been discussed before (please point me in the
> right direction if that is the case), but VSNL, my government-owned
> ISP (which also has a monopoly on all international traffic) made me
> sign that I will not use my Internet connection for voice traffic.
> Is there any way they could find out if I were using PGPfone, or
> rather, could I prevent them from finding out? 


Arun:

I can't give you a definitive answer here, but I'll take a shot.  
Most Internet telephony systems use UDP packets to transfer speech, 
since the lower overhead of UDP (as opposed to TCP) allows for better 
throughput.      I assume (but I'm not certain) that PGPfone works 
the same way.

Unfortunately, most of your other TCP/IP communication will be based 
on TCP packets.  Therefore, it's theoretically possible for your ISP 
to monitor your traffic, watching for large numbers of UDP packets.  
While a large amount of UDP traffic wouldn't _prove_ that you were 
using Internet telephony, they might _assume_ that the UDP traffic 
was voice traffic.  It all depends on how sophisticated and 
heavy-handed they wanted to be about it.

Now, I don't know if PGPfone uses UDP.  However, if it did, it would 
be as easy to detect as any other Internet telephony product.  An 
encrypted bunch of UDP bits is as easy to spot as an un-encrypted 
bunch, even if the contents can't be interpreted.

I hope this helps.  If any of this content is incorrect, my 
apologies.

-Harry



---------------
Harry Hochheiser           harry@tigger.jvnc.net
08 3A B5 F6 47 7F C7 C4 28 B4 8D D2 2E DF F6 1E






Thread