![]() Everyone who has used a cell phone knows the frustration of “echo” where you hear your own voice, slightly delayed. A Japanese research project called SpeechJammer exploited this part of our senses by inventing a “shut up gun.” When pointed at a person it makes them immediately stop talking. Latency in human speech transmision has deep psychological impact on a conversation. This makes a typical syncronous voice call impossible since there’s no way to determine when one person has stopped talking and when the other can respond without interrupting. The traffic passing through the Tor network must make an indeterminate number of proxy hops to be anonymized successfully. The big problem is as suspected, latency. When Tor is running and your Mumble client is configured to use TCP, connecting to your local SOCKS5 proxy offered by Tor allows you to join a Mumble server anonymously. Here is a case where Mumble’s non-standard protocol works to our advantage. This rules out most VoIP clients, since they use UDP. For any application to run over Tor, it must use the TCP protocol. Another lower level feature that’s important for our anonymity goal is TCP support. Your voice is only transmitted when you press the PTT button in the user interface. Guardian Project is focusing on the Android client named Plumble and the official server backported to Debian stable.Ī cool feature of Mumble is a Push To Talk (PTT) method to speak to the channel. The server software is also cross-platform. Mumble clients are available for Android and iOS, as well as a cross-platform desktop client. You simply connect to a Mumble server over the Internet and your voice will transmit to everyone else. If not, think of it as a conference call you don’t have to ring. If you’ve ever played Halo or World of Warcraft, this should sound familiar. Mumble is a non-standard protocol that was originally designed for realtime voice chat for video games. To achieve anonymity via Tor, there’s even more latency added to each packet. There is the high latency of the TCP protocol. There is the limited bandwidth of mobile data connections. ![]() ![]() There’s lots of roadblocks to get your voice from point A to point B over the Internet if you need to prevent eavesdropping or censorship. The journey towards anonymous and secure voice communication is a long one. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |