On Thu, Mar 26, 2009 at 4:19 PM, SIP <[email protected]> wrote:
> The first approach is the current approach:   build software with little
> thought to how it will be secured, opting for all the work of securing

What about SIP itself? Does it provide enough crypto to be solid? Or
is that handled only by the layer above it?

/r

_______________________________________________
-- Bandwidth and Colocation Provided by http://www.api-digital.com --

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users

Reply via email to