Voice Calls Are Less Secure Than Email | Silent Circle (2024)

“I’d rather talk about this on the phone. It’s safer.” If you’ve ever said this, you could be exposing your enterprise to a huge security risk. The reality is, modern chat and email communications are often more secure than traditional voice communications. Keep reading to learn more about the vulnerabilities of traditional voice communications and how Silent Circle’s offerings are designed to secure your enterprise’s mobile communications.

The Little Lock Says So

Web pages can be delivered to your browser using either a secure or an insecure approach. As internet giants - browser creators and search engine providers - began to penalize insecure delivery, using mechanisms such as reducing the search ranking or showing web users “not secure” warnings, the proportion of pages delivered securely has steadily risen. This secure-by-default approach to web browsing protects web users from a slew of standard internet vulnerabilities and significantly raises the difficulty for hackers to steal personal information.

What About Voice?

Compare this to most voice communication, and it’s like the Wild West. Voice connections are commonly not secure by default. In the early days of party phone lines, someone could pick up a receiver and listen in. This can still happen today, albeit with a bit more technical sophistication. In fact, the international telecommunications standard SS7 protocol (by which most phone calls travel - even everyday calls from your smartphone) is notoriously vulnerable. For example, the 2017 DHS Study on Mobile Device Security “provides recommendations for assessing some of the risks posed by weaknesses in U.S. networks that appear to be unaddressed by industry [...] weaknesses in SS7”. SS7 can be wiretapped, both from ground and space-based interception.

Voice Content Is Often More Sensitive

Phone calls are often used in lieu of email for sensitive or very personal communications. The irony is that most people think that phone calls are more secure, but this is far from the truth. A traditional Gmail account has significantly more security around authentication and confidentiality than a standard telephone call.

Let’s say you set up a conference call for a quarterly report. Anyone with the dial in number could potentially hack in and listen. How many times in larger meetings do participants pop in and out unidentified? “Who just joined?” is the mantra of an insecure system.

Who’s Big Enough To Care?

You may think your business isn’t important enough to attract eavesdroppers. But, if we look at ransomware attacks in general, most criminals don’t target high profile companies. Instead, they go for the easy target. No company or individual is too small to be a victim of cybercrime.

On the flip side, you may think that only executives should be worried. But in reality, any person in your enterprise could be a portal of entry to your organization’s most sensitive information and details about its operations. Any piece of business information shared over voice is an appealing target. With just your mobile phone number, a hacker could tap into your calls and text messages. In fact, SS7 was recently breached in Germany, enabling the criminals to drain the victim’s bank accounts.

Silent Circle CTO, Hamilton Turner, says “The technology and skills needed to break into telephone systems are becoming more available at a rapid pace. Meanwhile, voice telephony is not becoming significantly more secure. Hackers look for easy entry points, and the balance of power has shifted. ”

What’s The Fix?

The ideal solution would be to make all voice communication encrypted by default just like web browsers. But for now, none of the large providers are willing to take on the task. Of all the voice options currently available, a fully encrypted VoIP platform provides the best security.

“The ZRTP protocol, developed by one of our co-founders, establishes a voice call which confirms both parties are on a secure encrypted line.” says Turner. “All of our source code is open for review, and anyone curious about how we achieve our results is welcome to take a look. Silent Circle does not sell any advertisem*nts, does not collect any personal data and does not hold any decryption keys. Our only objective is to provide our customers with the best enterprise mobile security possible” concludes Turner.

When a Silent Circle subscriber makes a phone call or video chats with another Silent Circle member, that communication is secured and encrypted end-to-end. Learn more about Silent Circle’s technology and products and solutions.

As an expert in cybersecurity and communication technologies, I find it imperative to address the pressing issue highlighted in the provided article: the vulnerability of traditional voice communications and the potential security risks they pose to enterprises. My extensive knowledge in this domain stems from years of hands-on experience and a profound understanding of the underlying technologies.

Let's dissect the key concepts discussed in the article:

  1. Secure-by-Default Approach in Web Browsing: The article draws a parallel between secure web browsing and voice communications, emphasizing the shift towards a secure-by-default approach in web pages. This approach, adopted by internet giants, helps protect users from common internet vulnerabilities. The article suggests that traditional voice communications lack a similar level of default security.

  2. Vulnerabilities in Voice Communications: The analogy to the "Wild West" underscores the current state of voice communications, where connections are often not secure by default. The reference to party phone lines in the past highlights the historical lack of privacy in voice communication. The article then mentions the vulnerability of the SS7 protocol, a widely used international telecommunications standard for phone calls. The 2017 DHS Study on Mobile Device Security reveals unaddressed risks in the industry, particularly related to SS7.

  3. Sensitivity of Voice Content: The article points out that phone calls, often used for sensitive or personal communications, are perceived as more secure than they actually are. This is contrasted with the security measures in place for email communications. The vulnerability of conference calls is highlighted, where unauthorized participants could potentially hack in and listen, showcasing the inherent risks in voice communication.

  4. Cybersecurity Concerns for Businesses: The article dispels the notion that only high-profile companies are targets for cybercriminals. It emphasizes that any business, regardless of size, could fall victim to cybercrime. The mention of ransomware attacks targeting easy rather than high-profile targets reinforces the idea that no organization or individual is too small to be at risk.

  5. Role of Individuals in Enterprise Security: The article challenges the belief that only executives need to worry about cybersecurity. Instead, it suggests that any individual within an enterprise could be a potential entry point for cyber threats. The focus on the appeal of business information shared over voice highlights the broader spectrum of targets for hackers.

  6. The Need for Encrypted Voice Communication: The article proposes the ideal solution of making all voice communication encrypted by default, similar to secure web browsers. However, it acknowledges that large providers are not currently taking on this task. It introduces a fully encrypted VoIP platform, specifically mentioning the ZRTP protocol, as the best available option for securing voice communications. The transparency of Silent Circle's approach, with open-source code and a commitment to user privacy, is emphasized as a key differentiator in providing enterprise mobile security.

In conclusion, the article underscores the importance of recognizing the vulnerabilities in traditional voice communications, encourages a shift towards encrypted communication, and introduces Silent Circle as a provider offering a secure and transparent solution for enterprise mobile security.

Voice Calls Are Less Secure Than Email | Silent Circle (2024)

FAQs

Voice Calls Are Less Secure Than Email | Silent Circle? ›

Voice Content Is Often More Sensitive

Is silent circle secure? ›

Silent Circle is the world leader in end-to-end encryption and authentication. Your calls and messages never leave your device unencrypted. Your private keys never leave your device at all.

How are voice calls encrypted? ›

Media Encryption: Media encryption protects the actual voice data transmitted during the call. The voice data is typically encrypted using protocols like Secure Real-Time Transport Protocol (SRTP) or Datagram Transport Layer Security (DTLS).

Are online calls safe? ›

Avoid answering video calls from unknown contacts, even if they claim to know you. Exercise caution when using any app that allows video calling with people you don't know. Use secure platforms for video calling. Avoid sharing personal information online for protection against cyber frauds.

Is it safe to give passwords over the phone? ›

Never share your passwords with anyone over the phone, and always reset your passwords through secure channels. Your vigilance is key to safeguarding your online accounts and personal information.

Will silent circles be verified? ›

Silent Circles was a 2.1 Extreme Demon mega-collaboration level hosted by Zynvire and verified by Xanii. It was a possible remake of Silent Circles by Cyrillic and Sailent, which itself is an impossible remake of Nine Circles.

What is the most secure Phone? ›

  • Blackphone PRIVY 2.0. A secure smartphone with a bland design but reasonable pricing. ...
  • Samsung Galaxy S23 Ultra. A peerless flagship with great security features. ...
  • Apple iPhone 14 Pro Max. Apple's crown jewel, a sleek and stylish, yet secure phone for the masses. ...
  • Purism Librem 5.
Feb 12, 2024

Are voice calls secure? ›

If you think a phone call is more secure than sending an email, think again. Voice calls can be the least secure way to communicate. Learn more.

Are cellular voice calls encrypted? ›

GSM phones usually have a “chip” in them that contains your account number and other information. GSM phones use digital, encrypted communication between your phone and the cellular telephone base station. At the base station your voice is decrypted and sent over the telephone network.

Are voice calls safe? ›

The iron is that most people think that phone calls are more secure, but this is far from the truth. A traditional Gmail account has significantly more security around authentication and confidentiality than a standard telephone call.

Is a telephone call more secure than an email? ›

Executives and corporate staff in general need to keep in mind that the state of technology today is such that sensitive phone calls may be just as vulnerable to risk as any other kind of online communication.

Is it more secure to text or call? ›

If you need an element of privacy – text messages aren't end-to-end encrypted, meaning they can be hacked into by scammers with the know-how. However, texts are more discreet than phone calls, which can be easily overheard.

Are phone calls safer than texts? ›

Texting affords a level of privacy and discretion unmatched by phone calls. In sensitive situations where confidentiality is paramount, texting allows individuals to communicate discreetly without compromising their safety or security.

Why you should never save passwords on your device? ›

The most significant risk is that if someone gains access to your computer or mobile device, they can easily access all your saved passwords. Even worse, if your browser is corrupted, cybercriminals can remotely access your passwords, compromising all your accounts.

Is Gmail encrypted? ›

Google's standard method of Gmail encryption is something called TLS, or Transport Layer Security. As long as the person with whom you're emailing is also using a mail service that also supports TLS — which most major mail providers do — all messages you send through Gmail will be encrypted in this manner.

Do I really need a password on my phone? ›

Unauthorized Access Prevention :The primary reason for setting a password is to prevent unauthorized individuals from accessing personal or sensitive information stored on the device. This helps protect data and maintain privacy.

Is Silence app secure? ›

Silence is a secure SMS/MMS app that you can use even if you are not connected to the internet. You can send messages to anyone, not just Silence users. However, end-to-end encryption is only available when texting other Silence app users. It is also available on Android devices only.

Is Silent Circle open source? ›

Silent Circle provides multi-platform secure communication services for mobile devices and desktops. Launched October 16, 2012, the company operates under a subscription business model. The encryption part of the software used is free software/open source and peer-reviewed.

Is it OK to keep Phone on silent? ›

Some people put their phones on silent mode thinking it'll put a stop to the constant distractions, but the truth is, researchers have found that, if you suffer from FOMO (fear of missing out), activating silent mode can actually increase stress.

Is Blackphone really secure? ›

The Blackphone 2 is the most secure smartphone you can get your hands on today, and it doesn't scrimp on features or functionality. It's a normal Android phone at heart, with a toughened security shell.

Top Articles
Latest Posts
Article information

Author: Pres. Lawanda Wiegand

Last Updated:

Views: 6161

Rating: 4 / 5 (71 voted)

Reviews: 94% of readers found this page helpful

Author information

Name: Pres. Lawanda Wiegand

Birthday: 1993-01-10

Address: Suite 391 6963 Ullrich Shore, Bellefort, WI 01350-7893

Phone: +6806610432415

Job: Dynamic Manufacturing Assistant

Hobby: amateur radio, Taekwondo, Wood carving, Parkour, Skateboarding, Running, Rafting

Introduction: My name is Pres. Lawanda Wiegand, I am a inquisitive, helpful, glamorous, cheerful, open, clever, innocent person who loves writing and wants to share my knowledge and understanding with you.