<div dir="auto">Whilst this is generally true, any SIP provider that isn’t using TLS can reconstruct the fax image with voip diagnostic software/packet sniffers. Whilst not an endpoint, the fax does travel through their systems. </div><div dir="auto"><br></div><div dir="auto">I understand that people that work with voip systems are in a “privileged” position and so policies and procedures would prevent employees from doing this. It is technically trivial though.</div><div dir="auto"><br></div><div dir="auto"><br></div><div><br><div class="gmail_quote"><div dir="ltr" class="gmail_attr">On Thu, 13 Jan 2022 at 6:41 pm, Karl Auer <<a href="mailto:kauer@biplane.com.au">kauer@biplane.com.au</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">On Thu, 2022-01-13 at 05:18 +0000, Bradley Amm wrote:<br>
> Healthcare still loves it as it’s more secure than email apparently.<br>
> Yes let’s send test results via fax so they can sit in the machine in<br>
> full view of anyone who goes to them<br>
<br>
<a href="https://biplane.com.au/blog/?p=530" rel="noreferrer" target="_blank">https://biplane.com.au/blog/?p=530</a><br>
<br>
"Fax is point-to-point. It’s difficult to intercept except at the<br>
endpoints, interception between the endpoints takes a lot of<br>
specialised knowledge, and no endpoint is a honeypot. The medium is not<br>
inherently copyable. Interception at the endpoint takes a significant<br>
amount of time and requires the physical presence of an attacker. Any<br>
attacker would be able to access relatively few records. Access would<br>
be expensive and slow with very high risk of discovery (unless the<br>
attacker was on staff in which case all communication methods would be<br>
equally compromised), while for the legitimate user the rate of access<br>
is easily sufficient. So fax is actually not a bad means of<br>
transferring private data as long as the fax machines are not located<br>
in public spaces."<br>
<br>
Internet fax would be nice - fax machines with publicly reachable IP<br>
addresses, protected by SSL, that just print whatever page is sent to<br>
them. Some form of authentication would be essential of course :-)<br>
<br>
Regards, K.<br>
<br>
-- <br>
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~<br>
Karl Auer (<a href="mailto:kauer@biplane.com.au" target="_blank">kauer@biplane.com.au</a>)<br>
<a href="http://www.biplane.com.au/kauer" rel="noreferrer" target="_blank">http://www.biplane.com.au/kauer</a><br>
<br>
GPG fingerprint: 61A0 99A9 8823 3A75 871E 5D90 BADB B237 260C 9C58<br>
Old fingerprint: 2561 E9EC D868 E73C 8AF1 49CF EE50 4B1D CCA1 5170<br>
<br>
<br>
<br>
_______________________________________________<br>
AusNOG mailing list<br>
<a href="mailto:AusNOG@lists.ausnog.net" target="_blank">AusNOG@lists.ausnog.net</a><br>
<a href="http://lists.ausnog.net/mailman/listinfo/ausnog" rel="noreferrer" target="_blank">http://lists.ausnog.net/mailman/listinfo/ausnog</a><br>
</blockquote></div></div>-- <br><div dir="ltr" class="gmail_signature" data-smartmail="gmail_signature">Adam Heathcote - Systems Development Manager <br><br>Sent while on the go, apologies for typos and brevity.</div>