"Researchers Propose Novel Solution to Better Secure Voice over Internet Communication"
A new method to improve upon the security of Crypto Phones against eavesdropping attacks and other forms of man-in-the-middle attacks has been developed by researchers from the University of Alabama at Birmingham. Crypto Phones use end-to-end encryption to ensure the confidentiality of messages communicated between the sender and receiver, which requires authentication tasks to be performed by users. However, such tasks are still susceptible to human errors, leaving Crypto Phones vulnerable to MITM attacks. This article further discusses what Crypto Phones consist of, how Crypto Phones become vulnerable to attacks, and the use of Closed Captioning Crypto Phones as a solution.
UAB reports "Researchers Propose Novel Solution to Better Secure Voice over Internet Communication"