Aplikasi Voip Menggunakan Csipsimple Dengan Os Android Versi 4

Total Page:16

File Type:pdf, Size:1020Kb

Aplikasi Voip Menggunakan Csipsimple Dengan Os Android Versi 4 ELEKTRA, Vol.3, No.1, Januari 2018, Hal. 47 – 54 ISSN: 2503-0221 47 APLIKASI VOIP MENGGUNAKAN CSIPSIMPLE DENGAN OS ANDROID VERSI 4 Slamet Riyadi dan Janizal Prodi Teknik Mekatronika, Politeknik Enjinering Indorama, Purwakarta [email protected] Abstrak Perkembangan jaringan komputer yang semakin pesat memungkinkan lalu lintas suara melalui jaringan komputer atau biasa disebut VoIP (Voice Over Internet Protocol) atau dengan kata lain percakapan melintasi Internet adalah teknologi yang memungkinkan percakapan jarak jauh melalui internet sebagai: IP Telephony, Internet telephony atau Digital Telepon. Data suara diubah menjadi kode digital dan dialirkan melalui jaringan pengirim paket data, dan bukan sirkuit analog melalui telepon biasa. VoIP adalah suara yang dikirimkan melalui protokol internet (IP). Saat ini ada 2 teknologi internet telephony besar, teknologi H.323 dan Session Initiation Protocol (SIP), keduanya sering digunakan. Penggunaan jaringan IP memungkinkan pengurangan biaya. Biaya penekanan sinyal suara analog, seperti yang kita dengar ketika berkomunikasi di telepon diubah menjadi data digital dan di kirimkan melalui jaringan dalam bentuk paket data secara real time. Kata kunci: Voice Over Internet Protocol, Session Initiation Protocol (SIP) 1. Pendahuluan Perkembangan jaringan komputer yang semakin pesat memungkinkan untuk melewatkan trafik suara melalui jaringan komputer atau biasa yang disebut VoIP (Voice Over Internet Protocol). Voice Internet Protocol Voice over Internet Protocol (juga disebut VoIP, IP Telephony, Internet telephony atau Digital Phone) adalah teknologi yang memungkinkan percakapan suara jarak jauh melalui media internet. Dari masa ke masa manusia semakin dimudahkan dengan banyaknya produk hasil teknologi komunikasi, diantaranya saat ini adalah gadget/handphone. Selain itu ada juga fasilitas komunikasi yang sangat cepat informasinya dan tergolong relatif lebih murah yaitu internet. Voice Over Internet Protocol (VoIP) adalah teknologi yang menawarkan telepon melalui jaringan Internet Protocol (IP). Penggunaan jaringan IP memungkinkan penekanan biaya karena untuk menggunakannya tidak perlu membangun sebuah infrastruktur baru untuk melakukan komunikasi suara dan penggunaan lebar data (bandwidth) yang lebih kecil dibandingkan dengan telepon Private Automatic Brand eXchange (PABX) yaitu sebagai sentral telepon yang melayani bisnis tertentu atau kantor, sebagai lawan satu yang pembawa atau telepon umum perusahaan beroperasi bagi banyak perusahaan atau untuk masyarakat umum. CSipSimple adalah Voice over Internet Protocol (VoIP) aplikasi untuk sistem operasi Google Android menggunakan Session Initiation Protocol (SIP). Ini adalah open source dan perangkat lunak bebas yang dirilis dibawah lisensi GNU General Public. Lalu pada penggunaan Csipsimple kita hanya gunakan sebagai softphone client, yaitu sebagai menangkap hasil suara yang dihasilkan oleh server maupun sebaliknya. Makalah dikirim 5 Desember 2017; Revisi 20 Desember 2017; Diterima 19 Januari 2018 Aplikasi VoIP Menggunakan Csipsimple dengan Os Android Versi 4, Slamet Riyadi dan Janizal ELEKTRA, Vol.3, No.1, Januari 2018, Hal. 47 – 54 ISSN: 2503-0221 48 2. Dasar Teori 2.1. Definisi VoIP VoIP adalah nama dari sebuah teknologi komunikasi baru yang mengubah makna dari panggilan telepon frase. VoIP adalah singkatan dari forvoice melalui protokol internet, dan itu berarti "suara ditransmisikan melalui jaringan komputer. Teknik dasar Voice over Internet Protocol atau yang biasa dikenal dengan sebutan VoIP adalah teknologi yang memungkinkan kemampuan melakukan percakapan telepon dengan menggunakan jalur komunikasi data pada suatu jaringan (networking). 2.1.1. Komponen VoIP Komponen–komponen VoIP terdiri dari user agent, proxy, protokol VoIP, codec dan lain– lain. 1. Komponen VoIP berbasis software (softphone) Contoh komponen VoIP berbasis software, softphone SIP : CSipSimple untuk client di gadget berbasis OS android. 2. Komponen VoIP berbasis hardisk contoh komponen VoIP berbasis hardware : Personal computer (PC)/Laptop, switch/hub. 2.2. Asterik Now Asterik adalah server open source untuk mesin telepon dan perangkat lainnya, menawarkan fleksibilitas yang tidak terdengar didunia komunikasi berbayar. Asterik memberikan kekuasaaan untuk pengembangan dan beberapa integrator untuk membeuat solusi telekominikasi yang lebih maju. 2.3. Sistem Operasi Android Sistem operasi buatan Linus Torvalds pada tahun 1991, yang dikembangkan dengan perusahaan ternama google, dimana terdapat system yang menggunakan kinerja linux didalamnya yang dirancang khusus perangkat gadget smartphone maupun tablet android. 2.4. Aplikasi VoIP Banyak aplikasi voip yang termuka yaitu seperti Skype, yang sudah masuk kategori VoIP yang terkenal pada era sekarang ini. Dimana pengguna dapat saling Berkomunikasi dengan fitur Video Call maupun Chatting. 2.5. Spesifikasi Hardware (CSipSimple) Csipsimple merupakan SIP client open source VoIP softphone untuk os Android. Spesifikasi Hardware adalah spesifikasi minimal yang bisa digunakan untuk menjalankan aplikasi Softphone tersebut : - Minimal Android : 1.6 – keatas - Prosesor : Single Core 512 Ghz - RAM : 256 MB - Video Plugin : Bila Hanya Menggunakan Kamera Front (depan) 3. Metode Penelitian 3.1. Pemilihan Sistem Operasi Dalam pembuatan VoIP karena sofware ini sudah sangat populer dan juga AsteriskNow adalah proyek sumber terbuka telepon terkemuka dan komunitas Asterisk telah peringkat sebagai faktor kunci dalam pertumbuhan VoIP. Aplikasi VoIP Menggunakan Csipsimple dengan Os Android Versi 4, Slamet Riyadi dan Janizal ELEKTRA, Vol.3, No.1, Januari 2018, Hal. 47 – 54 ISSN: 2503-0221 49 1. Sistem Operasi : Windows 7 2. Aplikasi : a. AsterikNow b. CsipSimple c. VMware Workstation 3.2. Arsitektur Jaringan VoIP yang akan digunakan Dalam merancang jaringan tersebut diperlukan Perancangan jaringan VoIP sederhana, penulis menggunakan Topologi Star dengan menggunakan : 1 (satu) buah komputer dimana komputer tersebut difungsikan sebagai Server Softswitch menggunakan AsterikNow dan 2 unit perangkat gadget Android lainnya sebagai Client 4. Pembahasan 4.1. Implementasi dan Pembahasan menjelaskan bagaimana proses penggunaan komunikasi suara dengan menggunakan jaringan VoIP. 4.2. Instalasi SoftSwitch AsterikNow 4.2.1. Proses Booting Gambar 1 menunjukkan booting pertama pada saat ISO AsterikNow dimasukkan pada VMware Workstation. 4.2.2. Proses Instalasi Pada tahap selanjutnya akan muncul tampilan proses instalasi pada AsterikNow (Gambar 2). Gambar 1. Proses Booting AsterikNow. Gambar 2. Proses Instalasi AsterikNow. 4.3. Setting Konfigurasi Static IP AsterikNow Isikan settingan berikut dengan devertnet configuration : Static IP : 192.168.22.10 Netmask : 255.255.255.0 Default gateway IP : 192.168.22.254 Tampilan konfigurasi static IP AsterikNow ditunjukkan dalam Gambar 3. Aplikasi VoIP Menggunakan Csipsimple dengan Os Android Versi 4, Slamet Riyadi dan Janizal ELEKTRA, Vol.3, No.1, Januari 2018, Hal. 47 – 54 ISSN: 2503-0221 50 Gambar 3. Konfigurasi Static IP AsterikNow. kemudian pilih ok – save – save&quit dan kemudian ketikkan di command : root@localhost # /etc/init.d/network restart 4.4. Web Login AsterikNow 4.4.1 Konfigurasi Extension Saatnya memulai proses konfigurasi AsteriskNow menggunakan FreePBX yaitu melalui web browser di windows dengan menggunakan URL yang kita setting di server AsterikNow, yaitu: http://192.168.22.10/. Kemudian pilih menu freePBX Administration untuk masuk ke dalam konfigurasi. Gambar 4. Tampilan Halaman FreePBX. Isikan halaman login berikut dengan : Username: admin Password : admin lalu pilih Login untuk proses selanjutnya. 4.5. Setting Wireless Router 4.5.1 Konfigurasi Wireless Router untuk VoIP 1. Proses pertama konfigurasi TP-Link login dengan browser internet di windows, dengan mengetikkan di URL yang di setting default IP Address di TP-Link tersebut, biasanya dengan : http://192.168.1.1/ 2. Proses selanjutnya, pilih Network lalu pilih LAN dan kemudian setting sesuai ip broadcast server voip, penulis hanya mensetting ip address : http://192.168.22.12 3. Kemudian setting SSID, pilih Wireless – Wireless Setting. lalu kemudian disetting SSID, Region, dan Channel (bila perlu), lalu centang pada Wireless Router Radio dan Enable SSID Broadcast. 4. Tahap selanjutnya setelah mengkonfigurasi/ mensetting semua TP-Link seperti pada gambar- gambar diatas, lakukan reboot TP-Link tersebut. Aplikasi VoIP Menggunakan Csipsimple dengan Os Android Versi 4, Slamet Riyadi dan Janizal ELEKTRA, Vol.3, No.1, Januari 2018, Hal. 47 – 54 ISSN: 2503-0221 51 Gambar 5. Tampilan TP-LINK Wireless Router. 4.6. Instalasi Softphone CsipSimple 4.6.1 Konfigurasi CSipSimple Berikutnya kita memilih “Choose Wizard” lalu pada tab “Generic Wizard” kita pilih Local isikan column berikut dengan akun yang mau dibuat. Add Account Local Account Name : slamet User : 111 Server : 192.168.22.10 Password : 111slamet Gambar 6. Pemilihan dan Pengisian Form SIP Account. 4.6.2 Add Account SIP Extension FreePBX 1. SIP extention merupakan bagian penting dari VoIP dimana data-data dari client di-input kedalam server, didalam pengisian ada beberapa field yang harus diisi yaitu user Extention, Display, SIP Alias, Dan Secret (password). Gambar 7. Add Management SIP Account. Aplikasi VoIP Menggunakan Csipsimple dengan Os Android Versi 4, Slamet Riyadi dan Janizal ELEKTRA, Vol.3, No.1, Januari 2018, Hal. 47 – 54 ISSN: 2503-0221 52 2. Form dibawah ini adalah form yang telah diisikan user baru yaitu sebagai user pertama. # User Extension Pertama User Extention : 111 Display Name : slamet
Recommended publications
  • Wiretapping End-To-End Encrypted Voip Calls Real-World Attacks on ZRTP
    Institute of Operating Systems and Computer Networks Wiretapping End-to-End Encrypted VoIP Calls Real-World Attacks on ZRTP Dominik Schürmann, Fabian Kabus, Gregor Hildermeier, Lars Wolf, 2017-07-18 wiretapping difficulty End-to-End Encryption SIP + DTLS-SRTP (SIP + Datagram Transport Layer Security-SRTP) End-to-End Encryption & Authentication SIP + SRTP + ZRTP Introduction Man-in-the-Middle ZRTP Attacks Conclusion End-to-End Security for Voice Calls Institute of Operating Systems and Computer Networks No End-to-End Security PSTN (Public Switched Telephone Network) SIP + (S)RTP (Session Initiation Protocol + Secure Real-Time Transport Protocol) 2017-07-18 Dominik Schürmann Wiretapping End-to-End Encrypted VoIP Calls Page 2 of 13 wiretapping difficulty End-to-End Encryption & Authentication SIP + SRTP + ZRTP Introduction Man-in-the-Middle ZRTP Attacks Conclusion End-to-End Security for Voice Calls Institute of Operating Systems and Computer Networks No End-to-End Security PSTN (Public Switched Telephone Network) SIP + (S)RTP (Session Initiation Protocol + Secure Real-Time Transport Protocol) End-to-End Encryption SIP + DTLS-SRTP (SIP + Datagram Transport Layer Security-SRTP) 2017-07-18 Dominik Schürmann Wiretapping End-to-End Encrypted VoIP Calls Page 2 of 13 wiretapping difficulty Introduction Man-in-the-Middle ZRTP Attacks Conclusion End-to-End Security for Voice Calls Institute of Operating Systems and Computer Networks No End-to-End Security PSTN (Public Switched Telephone Network) SIP + (S)RTP (Session Initiation Protocol + Secure Real-Time
    [Show full text]
  • TECH TOOLS for ACTIVISTS Published : 2012-10-04 License : CC-BY T ABLE of CONT ENT S
    TECH TOOLS FOR ACTIVISTS Published : 2012-10-04 License : CC-BY T ABLE OF CONT ENT S Tech Tools For Activism 1 An introduction to this booklet 2 2 Securing your email 4 3 Anonymous Blogs and Websites 7 4 Microblogging Beyond Twitter 9 5 Browsing the Internet 11 6 Organising and Networking Online 14 7 Mobile Phone Security and Android Apps 18 8 Publishing and Networking News 21 9 Producing and Publishing Media to the Internet 23 10 Green Computing 25 11 Hiding & Deleting Things on your PC 27 TECH TOOLS FOR ACTIVISM 1. AN INTRODUCTION TO THIS BOOKLET 2. SECURING YOUR EMAIL 3. ANONYMOUS BLOGS AND WEBSITES 4. MICROBLOGGING BEYOND TWITTER 5. BROWSING THE INTERNET 6. ORGANISING AND NETWORKING ONLINE 7. MOBILE PHONE SECURITY AND ANDROID APPS 8. PUBLISHING AND NETWORKING NEWS 9. PRODUCING AND PUBLISHING MEDIA TO THE INTERNET 10. GREEN COMPUTING 11. HIDING & DELETING THINGS ON YOUR PC 1 1. AN INT RODUCT ION T O T HIS BOOKLET T his booklet will help you to: use email securely publish news and upload media anonymously make your web browsing more anonymous and secure use Facebook and Twitter more securely get organised online without relying on corporate social networking sites use encrypted messaging on mobile phones hide stuff on your computer so it can't be found find a more secure and decentralised replacement for Twitter support free software, open licences and decentralised/ federated communication. Why this booklet is important: This booklet provides an introduction to the effective use of technology for activism, with links to step-by-step guides and further information.
    [Show full text]
  • Portable Wi-Fi Calling and Interactive Voice Response System
    www.ijemr.net ISSN (ONLINE): 2250-0758, ISSN (PRINT): 2394-6962 Volume-7, Issue-1, January-February 2017 International Journal of Engineering and Management Research Page Number: 384-386 Portable Wi-Fi Calling and Interactive Voice Response System Ruchi W. Kasare1, Pooja K. Muneshwar2, Nikhil D. Tembhekar3, Prof. V. P. Yadav4, Prof. J. V. Shriral5 1,2,3,4,5Department of Computer Science and Engineering, Priyadarshani College of Engineering and Research, Nagpur University, Maharashtra, INDIA ABSTRACT Wireless IP-PBX utilizes WIFI technology for Implementation of a VoIP telephony system using communication, the same wireless infrastructure used for an IP Telephony solution in the organization as IVR. A new your corporate network. Just as we use mobiles and technology VoIP or Internet Telephony means that your laptops within this wireless infrastructure to gain access voice is carried over the IP network, otherwise known as to information, now we can use wireless IP phones the Internet. Voice which is an analog signal, is converted system as this system uses the telephony function to digital data, which is then disassembled and transmitted through the Internet or Internet to be recovered back to an directly into an already existing data network. This analog signal an the other using an IP Telephony solution provides an advantage that voice and data network can which is an Linux base system. be used together using single system. One of the major This service can be properly managed and advantages of the IP-PBX wireless phone is that you can deployed over a network with less stress and expenses.
    [Show full text]
  • A Survey of Open Source Products for Building a SIP Communication Platform
    Hindawi Publishing Corporation Advances in Multimedia Volume 2011, Article ID 372591, 21 pages doi:10.1155/2011/372591 Research Article A Survey of Open Source Products for Building a SIP Communication Platform Pavel Segec and Tatiana Kovacikova Department of InfoCom Networks, University of Zilina, Univerzitna 8215/1, 010 26 Zilina, Slovakia Correspondence should be addressed to Tatiana Kovacikova, [email protected] Received 29 July 2011; Revised 31 October 2011; Accepted 15 November 2011 Academic Editor: T. Turletti Copyright © 2011 P. Segec and T. Kovacikova. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. The Session Initiation Protocol (SIP) is a multimedia signalling protocol that has evolved into a widely adopted communication standard. The integration of SIP into existing IP networks has fostered IP networks becoming a convergence platform for both real- time and non-real-time multimedia communications. This converged platform integrates data, voice, video, presence, messaging, and conference services into a single network that offers new communication experiences for users. The open source community has contributed to SIP adoption through the development of open source software for both SIP clients and servers. In this paper, we provide a survey on open SIP systems that can be built using publically available software. We identify SIP features for service deve- lopment and programming, services and applications of a SIP-converged platform, and the most important technologies support- ing SIP functionalities. We propose an advanced converged IP communication platform that uses SIP for service delivery.
    [Show full text]
  • Performance Analysis of Voip Call
    Buletin Pos dan Telekomunikasi Vol. 13 No.1 (2015) 79-96 Performance Analysis of VoIP Call Application Android in MANET (Mobile Ad Hoc Network) Analisis Unjuk Kerja Aplikasi VoIP Call Android di Jaringan MANET (Mobile Ad Hoc Network) Ryan Ari Setyawan Jurusan Teknik Informatika, Fakultas Teknik, Universitas Janabadra Jl. Tentara Rakyat Mataram No. 55-57 Yogyakarta 55231, Indonesia e-mail: [email protected] INFORMATION ARTI CLE A B S T R A K Manuscript received June 15, 2015 Penelitian ini bertujuan menganalisis kinerja aplikasi VoIP call android di Revised June 24, 2015 jaringan MANET (mobile ad hoc network). Hasil pengujian menunjukan bahwa Approved June 25, 2015 aplikasi VoIP call android dapat digunakan di jaringan MANET. Delay yang dihasilkan paling besar di pengujian indoor dengan jarak 11-15 meter yakni Kata kunci : sebesar 0,014624811 seconds. Packet loss yang dihasilkan pada range 1%-2%, Android sedangkan standar packet loss yang ditetapkan oleh CISCO untuk layanan aplikasi VoIP VoIP adalah < 5%. Jitter yang dihasilkan yakni antara 0,01-0,06 seconds MANET sedangkan standar yang ditetapkan oleh CISCO adalah ≤ 30 ms atau 0,03 seconds. Throughput yang dihasilkan pada proses pengujian yakni antar 161 kbps-481 kbps. A B S T R A CT Keywords: This study aims to analyze the performance of VOIP call android application in the Android MANET (mobile ad hoc network). The results showed that VoIP applications could VoIP be implemented in MANET network. The highest delay is produced in indoor MANET testing with distance of 11-15 meters, which is equal to 0.014624811 seconds. Packet loss is generated in the range of 1% -2%, while packet loss standards set by Cisco for VoIP application services are <5%.
    [Show full text]
  • Battery and Data Drain of Over-The-Top Applications on Low-End Smartphones
    CORE Metadata, citation and similar papers at core.ac.uk Provided by University of the Western Cape Research Repository IST-Africa 2018 Conference Proceedings Paul Cunningham and Miriam Cunningham (Eds) IIMC International Information Management Corporation, 2018 ISBN: 978-1-905824-59-5 Battery and Data Drain of Over-The-Top Applications on Low-end Smartphones Shree Om1, William D. Tucker2 University of the Western Cape, Robert Sobukwe Road, Cape Town, 7535, South Africa1,2 Tel: +27 21 959 3010, Fax: +27 21 959 1274, Email: [email protected] 1, [email protected] 2 Abstract: Low-end smartphones with sub $50 price tags provide affordable device ownership to low-income populations. However, their limited capacity, when combined with the need for multimodal connectivity, raises usage concerns in rural off-grid regions. Some off-grid regions in sub-Saharan Africa provide recharge facilities using solar power and charge money for the service. Adding data bundle costs to frequent recharge costs, affordability of low-end smartphones becomes questionable in such areas. Community-controlled solar-powered wireless mesh network models with Session Initiation Protocol capability could alleviate the network usage cost conundrum and consume less power in low-end smartphones with the usage of WiFi. This paper reports on investigations that reveal usage of WiFi consumes less battery than 3G, 2G and Bluetooth. In addition, we feel that lowering recharge costs also requires battery consumption knowledge of the over- the-top applications. Using automated voice calls, this paper reports on battery and data consumption by multiple popular social media applications using one type of low-end smartphone.
    [Show full text]
  • Debian's Role in Establishing an Alternative to Skype
    Debian’s role in establishing an alternative to Skype Motivation, Challenges and Tactics Daniel Pocock [email protected] http://www.OpenTelecoms.org mini-DebConf, Paris, November 2012 Daniel Pocock [email protected] Debian’s role in establishing an alternative to Skype Introduction Motivation – why do we need to do something? What happens if we do nothing? Challenges – why hasn’t it been done already? Tactics – what can we do over the next 12 months? Daniel Pocock [email protected] Debian’s role in establishing an alternative to Skype Motivation Some background Yes, you’ve seen me before – in Managua. Slides and video are available and highly recommended. Is there something new? – yes. Daniel Pocock [email protected] Debian’s role in establishing an alternative to Skype Motivation Why mention Skype? Widely deployed – hundreds of millions of users Interdependency – unlike other types of software, interoperability is a critical factor in the success of real-time communications software Viber – another proprietary solution that has quickly gained traction thanks to ease of use. The free software community missed the boat in the desktop VoIP arena, now the same may be happening for mobile. Daniel Pocock [email protected] Debian’s role in establishing an alternative to Skype Motivation How bad is it? Marketing – Skype allows Microsoft to study your thoughts and emotions in real time. Feedback to advertisers. Privacy – Microsoft has patented a technique for monitoring Skype. Call records, friend lists, etc. Statistical techniques for identifying who is pregnant, who is a homosexual, have all been exposed recently.
    [Show full text]
  • Droidleaks: a Comprehensive Database of Resource Leaks in Android Apps
    Noname manuscript No. (will be inserted by the editor) DroidLeaks: A Comprehensive Database of Resource Leaks in Android Apps Yepang Liu · Jue Wang · Lili Wei · Chang Xu · Shing-Chi Cheung · Tianyong Wu · Jun Yan · Jian Zhang Received: date / Accepted: date Abstract Resource leaks in Android apps are pervasive. They can cause se- rious performance degradation and system crashes. In recent years, many re- source leak detection techniques have been proposed to help Android develop- ers correctly manage system resources. Yet, there exist no common databases of real-world bugs for effectively comparing such techniques to understand their strengths and limitations. This paper describes our effort towards con- structing such a bug database named DroidLeaks. To extract real resource leak bugs, we mined 124,215 code revisions of 34 popular open-source Android apps. After automated filtering and manual validation, we successfully found 292 fixed resource leak bugs, which cover a diverse set of resource classes, from 32 analyzed apps. To understand these bugs, we conducted an empirical study, which revealed the characteristics of resource leaks in Android apps and common patterns of resource management mistakes made by developers. To further demonstrate the usefulness of our work, we evaluated eight resource leak detectors from both academia and industry on DroidLeaks and per- Yepang Liu Shenzhen Key Laboratory of Computational Intelligence, Department of Computer Science and Engineering, Southern University of Science and Technology, Shenzhen, China. E-mail: [email protected] Jue Wang, Chang Xu State Key Laboratory for Novel Software Technology and Department of Computer Science and Technology, Nanjing University, Nanjing, China E-mail: [email protected], [email protected] Lili Wei, Shing-Chi Cheung Department of Computer Science and Engineering, Hong Kong University of Science and Technology, Hong Kong, China.
    [Show full text]
  • Digital Source Protection for Journalists
    3 Tow Center for Digital Journalism DIGITAL A Tow/Knight Report SECURITY AND SOURCE PROTECTION FOR JOURNALISTS SUSAN MCGREGOR Funded by the Tow Foundation and the John S. and James L. Knight Foundation 4 Acknowledgements This paper is the product of countless conversations, encounters, recommen- dations and insights provided to me over the past year by members of the digital security and journalism communities. Though it would be impossible to name everyone whose insight and exper- tise has informed this work, my deepest thanks go to Franzi Roesner, Carey Shenkman, Nabiha Syed, Seamus Tuohy, Chris Walker and Carol Waters for providing invaluable feedback and direction on early versions of this pa- per; your expertise and insight was invaluable. Also to Oktavia Jonsdottir, Scott Klein, Quinn Norton, Jeremy Singer-Vine and Jennifer Valentino- DeVries, who shared their ideas and work processes with me. And a very special thanks to Peter G. Neumann, who offered me the long view on digital security and directed me to essential resources and experts on the subject. This project would also not have been possible without the financial and intellectual support of my colleagues at Columbia Journalism School, and the Tow Center for Digital Journalism–particularly Emily Bell and Taylor Owen. Likewise, I am very grateful to both OpenITP and TacticalTech– organizations whose generosity in hosting me in the fall of 2013 made pos- sible so many enlightening interactions with the digital security community. Without the openness of these organizations and their associates, this work would not have been possible. And finally, many grateful thanks to my talented, enthusiastic, and insightful illustrator and collaborator, Matteo Farinella, for truly making the invisible, visible.
    [Show full text]
  • Safety on the Line Exposing the Myth of Mobile Communication Security
    Safety on the Line Exposing the myth of mobile communication security Prepared by: Supported by: Cormac Callanan Freedom House and Hein Dries-Ziekenheiner Broadcasting Board of Governors This report has been prepared within the framework Contacts of Freedom House/Broadcasting Board of Governors funding. The views expressed in this document do not FOR FURTHER INFORMATION necessarily reflect those of Freedom House nor those of PLEASE CONTACT: the Broadcasting Board of Governors. Mr. Cormac Callanan July 2012 Email: [email protected] Mr. Hein Dries-Ziekenheiner Email: [email protected] 2 Safety on the Line Exposing the myth of mobile communication security Authors CORMAC CALLANAN HEIN DRIES-ZIEKENHEINER IRELAND THE NETHERLANDS Cormac Callanan is director of Aconite Internet Solutions Hein Dries-Ziekenheiner LL.M is the CEO of VIGILO (www.aconite.com), which provides expertise in policy consult, a Netherlands based consultancy specializing development in the area of cybercrime and internet in internet enforcement, cybercrime and IT law. Hein security and safety. holds a Master’s degree in Dutch civil law from Leiden University and has more than 10 years of legal and Holding an MSc in Computer Science, he has over 25 technical experience in forensic IT and law enforcement years working experience on international computer on the internet. networks and 10 years experience in the area of cybercrime. He has provided training at Interpol and Hein was technical advisor to the acclaimed Netherlands Europol and to law enforcement agencies around the anti-spam team at OPTA, the Netherlands Independent world. He has worked on policy development with the Post and Telecommunications Authority, and frequently Council of Europe and the UNODC.
    [Show full text]
  • Wiretapping End-To-End Encrypted Voip Calls: Real-World Attacks on ZRTP
    Preprint Version, Accepted for Publication in PoPETS 2017; 2017 (3):1–17 Dominik Schürmann*, Fabian Kabus, Gregor Hildermeier, and Lars Wolf Wiretapping End-to-End Encrypted VoIP Calls: Real-World Attacks on ZRTP Abstract: Voice calls are still one of the most com- saging apps, such as WhatsApp and Facebook Messen- mon use cases for smartphones. Often, sensitive personal ger [10, 36]. As a result, mobile messaging, the most information but also confidential business information popular smartphone feature, finally includes end-to-end is shared. End-to-end security is required to protect encryption for average users. Comparing their security against wiretapping of voice calls. For such real-time features with that of voice calls shows a major imbal- communication, the ZRTP key-agreement protocol has ance. While making voice calls is the second most popu- been proposed. By verbally comparing a small number lar smartphone feature with 93% popularity [25], its se- of on-screen characters or words, called Short Authenti- curity is often neglected. It is difficult to retrofit the tra- cation Strings, the participants can be sure that no one ditional Public Switched Telephone Network with end- is wiretapping the call. Since 2011, ZRTP is an IETF to-end security, but it is feasible to protect users of mod- standard implemented in several VoIP clients. ern Voice over IP (VoIP) apps. In this paper, we analyzed attacks on real-world VoIP To protect real-time communication channels, the systems, in particular those implementing the ZRTP ZRTP key agreement protocol has been proposed. Based standard. We evaluate the protocol compliance, er- on the Diffie-Hellmann (DH) key exchange, it has been ror handling, and user interfaces of the most common standardized in 2011 as RFC 6189 [38].
    [Show full text]
  • Real-Time Communications Quick Start Guide
    Real-Time Communications Quick Start Guide Daniel Pocock [http://danielpocock.com] Real-Time Communications Quick Start Guide Daniel Pocock [http://danielpocock.com] Copyright © 2013, 2014, 2015 Daniel Pocock Table of Contents Preface ........................................................................................................................ x 1. Introduction .............................................................................................................. 1 Federation ............................................................................................................ 1 Independent and decentralized alternatives to federation ............................................... 1 Private networks ........................................................................................... 1 Decentralized networks .................................................................................. 1 Conclusion ................................................................................................... 2 Choosing between SIP and XMPP ........................................................................... 2 Choice of operating system ..................................................................................... 3 Using a ready-to-run or turn-key solution .......................................................... 3 Using a generic GNU/Linux distribution ........................................................... 3 Use latest software versions ...................................................................................
    [Show full text]