Ovvero il VoIP P2P sicuro secondo Philip Zimmermann — basato sul protocollo ZRTP.
ZRTP protocol uses a public key algorithm [but] does not rely on a public key infrastructure (PKI). In fact, it does not use persistant public keys at all. It uses ephemeral Diffie-Hellman with hash commitment, and allows the detection of man-in-the-middle (MiTM) attacks…
approfondimenti: Introduzione alla crittografia, ZRTP Internet Draft
articoli su ZRTP: Wired news, Associated Press, eWeek, TechWorld, CNET News