I suggest interested people to read it, especially the second part, as there is an innovative categorization of the various voice encryption technologies that get used in several sectors.
I tried to explain and get out from this widely fragmented technological sector by providing a wide overview on technologies that usually are absolutely unrelated one-each-other but practically they all apply to voice encryption following that categorization:
- Mobile TLC Industry voice encryption standards
- Government and Military voice encryption standards
- Public safety voice encryption standards
- IETF voice encryption standards
- Misc proprietary voice encryption technologies
It’s a huge slideware, 122 slides, i suggest to go reading the 2nd part skipping interception technologies overview already covered by my presentation of 2009.
Especially i like the concept of Chocolate grade encryption that want to provide some innovation on the Snake Oil Encryption concept.
But i need to get more in depth about the Chocolate grade encryption context, will probably do before end-of-year by providing an applied course on understanding and evaluating practically the real security context of various voice encryption technologies.