![]() | This page is an archive of past discussions. Do not edit the contents of this page. If you wish to start a new discussion or revive an old one, please do so on the current talk page. |
Clearly, one should be VERY careful when speaking to someone over the phoneline unless they can prove that they are who they say they are (if a Bank phones you, then they should clearly know your financial details, etc... - but even then, this might not be enough information to the very cautious).
Anyhow, are there any **Cryptographic Methods of Caller ID spoofing protection** (or, potentially, cryptographic methods for detecting whether a call has been spoofed)? The article mentions some technical information, but it DOES NOT MENTION PROTECTION COUNTERMEASURES to Caller ID spoofing, and I really think it should.
![]() | This page is an archive of past discussions. Do not edit the contents of this page. If you wish to start a new discussion or revive an old one, please do so on the current talk page. |
Clearly, one should be VERY careful when speaking to someone over the phoneline unless they can prove that they are who they say they are (if a Bank phones you, then they should clearly know your financial details, etc... - but even then, this might not be enough information to the very cautious).
Anyhow, are there any **Cryptographic Methods of Caller ID spoofing protection** (or, potentially, cryptographic methods for detecting whether a call has been spoofed)? The article mentions some technical information, but it DOES NOT MENTION PROTECTION COUNTERMEASURES to Caller ID spoofing, and I really think it should.