>>17217>this is what glowguyghurs use Yeah this is also what they go out of their way to compromise. Want to go look up the Swiss "CryptoAG" company that was basically a literal (not lefty imagined hysterics) CIA front selling compromised encryption devices to all the despots in the world, advertising that it was making stuff that the CIA and KGB couldn't crack etc.
There was also a super secret encrypted cell phone company in the late 90s and early 2000s that basically was using such lousy tech implementation that it was very easy to crack ; it wasn't a front or was intentionally weakened, but of course the gov't looked very hard at anyone who was paying stupid amounts of money for an encrypted phone system at the time and found a bunch of drug cartels, terrorists etc…simply because of it.
You should probably link to something you're talking about because as described that…doesn't sound right.
>Radio mastsOkay, there are a lot of ways to do this, but that's not exactly a phone call. You can't use HAM bands or whatever to make a regular phone call to someone the whole way through, at some point you have to get into the phone system etc.
>virtual switchboardsVOIP PBX are not that difficult really, cumbersome though but the main issue is having to deal with where it breaks into the "normal" phone systems.
>Activating the SIM is a pain in the ass and cost a fuckton of moneyWho sells these SIMs? What kind of SIM is it, a "normal" one or is it satellite or..? WiFi only?
>let you spoof your number There is tech to do this in various ways with differing levels of sophistication
>encrypt your calls This only works if the "other side" also knows the cryptographic key or paired key, so its not like you can encrypt just your side and the other person can understand you just fine etc. Tons of VOIP apps today do encrypted calls.
>making for delaysDepending on what kind of delay you mean, this can be done several ways or may not apply.
>Cannot receive callsPermanently? Only at certain times? There are several ways this could be done but it may not necessarily mean better security/privacy
>voice changerLots of software for this , plus separate devices
>see if someone is tapping your connection How? What does it "see" If you're on a decently encrypted call you don't have to worry about this. If you're broadcasting clear with a normal cell phone, it can be hard to tell if someone is listening depending on certain parameters. You can try to see if someone is trying to route your call through a magically appearing faux tower (aka stingray device) but aside from that, you'd only have to worry about someone at the provider of the number being compelled to tap the line and that's different
The whole thing sounds a bit suspect and, especially if its proprietary, may be selling a lot of expensive snake oil that makes you stand out. A FOSS platform that does what you describe would be interesting start and the only way I'd even consider using something that makes these kinds of claims.
>>17235Lets just say this author has been unreliable, outdated, or otherwise of issue before, also making some significant assertions about security or privacy that have been questionable. Not everything is necessarily wrong, but taken with a huge grain of salt.