In the age of the information society these values are often undermined, for various reasons. By now a whole business trade has developed that deals exclusively with personal data, its acquisition and usage, for example for advertising purposes. But not only the commercial trade with personal data endangers data privacy and personal privacy. From governmental side as well there are increasingly more intrusions and invasions into data privacy as well as personal privacy, for various different reasons. The location of a mobile telephone can be determined to within a few yards by using triangulation and multiple base stations. This information can be retained for more than six months. Online communication contains the risk of being tapped, a potential invasion of the user's personal & data privacy. Using encryption techniques can decrease that risk. But the safest way would be if the existence of a communication were unknown.
The client necessary to form a "Voice over Peer to Peer"-network is part of a computer network as a "peer" on the one hand. On the other hand it is an "instrument" necessary to set up a communication connection (respectivly VoIP, Instant messaging, File transfer, Screen sharing etc.) using the "Peer to Peer"-network. This means, on the one hand it has to provide the service necessary to set up or connect communication requests. On the other hand it has to be able to generate and answer communication requests.
In order to realise anonymous communication, a communication request can never be set up directly. For this purpose a communication request is always directed through a number of different clients (peers). These intermediate clients are of course not allowed to have access to the transmitted data. This is guaranteed by way of encryption.
To guarantee inexpensive, secure & anonymous communication using the Internet, the server application was engineered under the assumption of a "hybrid or hierarchal P2P system". This demands for de-central organisation in the server environment. Concretely this means that the servers themselves build a "pure P2P system", thus generating a "multi server environment". In addition, the highest possible service capability of the server application was necessary to allow for inexpensive operating. In specific this means that one single server application or one single server has to be able to administer as many users as possible. In other words the server application has to be implemented scalable in a performant, resource-efficient way and in the sense of a "pure P2P System".
Voptop enables you to communicate anonymously and untraceable. Thus, this is the central unique selling point that Voptop wishes to offer. This can be achieved because no direct connection between the communication parties is established at any given time. Further more there is no central switchboard that is interconnected between the communication parties. Therefore, there is no central point of attack or "interception point" on which to wiretap or from which to trace a communication connection from.
This is achieved by the peer-to-peer network Voptop creates through its users. A communication connection is always channelled through a number of Voptop participants and thus, is disguised.
To protect communications and transmitted data in general, Voptop employs a hybrid encryption technique. This means that Voptop uses an asymmetrical encryption as well as a symmetrical encryption. The asymmetrical encryption is used solely to be able to define a common key for the symmetrical encryption. After a common symmetrical key is defined symmetrical encryption is employed exclusively. Thus, the advantages of both techniques can be used. The RSA-algorithm (4096 Bit key) is used in asymmetrical encryption whereas "eXtended Tiny Encryption"-algorithm (short XETA) in "CBC encryption mode" is used in symmetric encryption.
As a result of the de-centralised orientation of the Voptop network, Voptop offers highly reliable safeguarding against failures, whether they are a result of attacks on IT-infrastructure or technical failures. Server as well as clients form the Voptop peer-to-peer network. If peers and with that parts of the network fail, all other peers (server & client) continue to function unimpaired.