Date: 08/02/06 (Open Source) Keywords: no keywords
What was most interesting to me, however, is that the stack also uses encryption to bypass phone company filters designed to stop VOIP traffic.
Source: http://blogs.zdnet.com/open-source/?p=732