From Wikipedia, the free encyclopedia

Merge with Secure voice?

This should probably be merged with Secure voice

Yeah, that could work. — Matt Crypto 15:00, 2 September 2005 (UTC) reply

External links

The external links section currently reads like the yellow pages. All the links are to companies offering secure telephone services, none of which asserts their notability. I feel inclined to remove the whole lot. Any comments?-- Teemuk 12:02, 20 October 2006 (UTC) reply

Yeah, most of them provide little information about the topic, although this link might be worth keeping. — Matt Crypto 12:24, 20 October 2006 (UTC) reply

How Secure Telephones work

This section says nothing about, how really secure telephones work. There were supposed to be some technical details. - Yyy 11:59, 6 May 2007 (UTC) reply

More informations should be done on the different technologies

There are too few information regarding the various voice encryption technologies out-there. I am not speaking about products but technologies and standards as there is ZRTP, SRTP, SCIP, TETRA, A5/1, SNOW3D, ZUC and a lot more but those are not presented in a homogeneous way to let the reader understand the fragmented scenario of existing technologies. —Preceding unsigned comment added by Fpietrosanti ( talkcontribs) 07:22, 1 October 2010

Brahms

No mention of the BID/ 470 Brahms the "portable" UK secure phone system of the 1980s: [1] Was used by Margaret Thatcher during the Falklands War: [2], [3]. Martinevans123 ( talk) 21:26, 25 February 2022 (UTC) reply

From Wikipedia, the free encyclopedia

Merge with Secure voice?

This should probably be merged with Secure voice

Yeah, that could work. — Matt Crypto 15:00, 2 September 2005 (UTC) reply

External links

The external links section currently reads like the yellow pages. All the links are to companies offering secure telephone services, none of which asserts their notability. I feel inclined to remove the whole lot. Any comments?-- Teemuk 12:02, 20 October 2006 (UTC) reply

Yeah, most of them provide little information about the topic, although this link might be worth keeping. — Matt Crypto 12:24, 20 October 2006 (UTC) reply

How Secure Telephones work

This section says nothing about, how really secure telephones work. There were supposed to be some technical details. - Yyy 11:59, 6 May 2007 (UTC) reply

More informations should be done on the different technologies

There are too few information regarding the various voice encryption technologies out-there. I am not speaking about products but technologies and standards as there is ZRTP, SRTP, SCIP, TETRA, A5/1, SNOW3D, ZUC and a lot more but those are not presented in a homogeneous way to let the reader understand the fragmented scenario of existing technologies. —Preceding unsigned comment added by Fpietrosanti ( talkcontribs) 07:22, 1 October 2010

Brahms

No mention of the BID/ 470 Brahms the "portable" UK secure phone system of the 1980s: [1] Was used by Margaret Thatcher during the Falklands War: [2], [3]. Martinevans123 ( talk) 21:26, 25 February 2022 (UTC) reply


Videos

Youtube | Vimeo | Bing

Websites

Google | Yahoo | Bing

Encyclopedia

Google | Yahoo | Bing

Facebook