![]() |
Encrypter-X
Encrypted audio connection
|
|
All you need to do is configure the ports on both computers accordingly and enable them in the firewall. The port for the microphone on one computer is the port for the speaker on the other computer and vice versa. Synchronization, which ensures that the key is scanned at the same position on both sides for encryption and decryption, is automatic. Manually, only the same key bundle must be selected on both sides. If a different key bundle is selected on both sides, only noise comes out of the speakers. The same applies if a key bundle is selected for the microphone and a receiver of the audio stream listens to it without decoding. This shows that the encrypted connection is absolutely tap-proof. |