VOIP

We have found 38 items matching your search query.

fallback-no-image-2036

OSTel

Encrypted voice app that works on most mobile devices and desktops. SIP compatible with other SIP apps. Service is Free, but they use different apps for different platforms which may be pay.
fallback-no-image-1681

PhoneCrypt

Encrypted voice and messaging. Full range of voice products from mobile to PBX for enterprise. Free desktop version available.
fallback-no-image-2589

Lua

Encrypted communications app for healthcare and enterprise. Features Internal and external messaging, voice call escalation, file sharing, self-destructing messages and HIPAA compliance.
fallback-no-image-1946

Acrobits

Provider of branded VOIP/SIP software to corporations and telecom companies that operates independently or with a PBX. Software supports ZRTP and SRTP.
fallback-no-image-2039

TrustCall

Encrypted voice for mobile. FIPS 140-2 Level 1 Certified.
fallback-no-image-1791

Freedombox

A secure network protocol designed to facilitate communications among users with or without internet access. Features include, encrypted web proxies, VOIP, email, and mesh networking. In testing.
fallback-no-image-2778

Zello

Push-to-talk communications app. Connects to existing LMR radio systems. Public channels allow conversions with other users. Teams use own private network, can assign channels to groups and one-time u
fallback-no-image-1948

Linphone

SIP app for mobile and desktop. Supports SRTP and ZRTP. Free.
fallback-no-image-2046

Facebook Messenger

Offers optional encryption for conversations. Two step process requires enabling in settings, then choosing “Secret” for each new message.
fallback-no-image-1918

Enigmabox

Router that routes all traffic through cjdns-based VPN and/or meshnet. Includes a VOIP telephone and one year subscription. Provides all the apps needed like email, web browsing, and file sharing for
fallback-no-image-2929

Scrambl3

An anonymous voip and messaging app that uses an outer VPN tunnel and transmits VOIP and data on an inner tunnel. No phone number is needed and all calls and texts are peer-to-peer with no server in b
fallback-no-image-1950

CryptoGateway

Network hardware that prevents Man-in-the-middle attacks ie: fake cell sites like Stingray by connecting encrypted calls between secure mobile phones and any standard phone set acting as an extension